syzbot


INFO: task hung in _vm_unmap_aliases (3)

Status: upstream: reported C repro on 2024/01/09 18:18
Subsystems: mm
[Documentation on labels]
Reported-by: syzbot+fe8f8efd070d727de971@syzkaller.appspotmail.com
First crash: 592d, last: 24m
Discussions (4)
Title Replies (including bot) Last reply
[syzbot] Monthly mm report (Dec 2024) 0 (1) 2024/12/05 09:04
[syzbot] Monthly mm report (Oct 2024) 0 (1) 2024/10/03 09:02
[syzbot] Monthly mm report (Sep 2024) 0 (1) 2024/09/02 08:17
[syzbot] [modules?] INFO: task hung in _vm_unmap_aliases (3) 0 (1) 2024/01/09 18:18
Similar bugs (3)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream INFO: task hung in _vm_unmap_aliases kernel 1 1731d 1731d 0/28 auto-closed as invalid on 2020/11/17 05:59
linux-5.15 INFO: task hung in _vm_unmap_aliases 1 182d 182d 0/3 auto-obsoleted due to no activity on 2025/02/23 10:14
upstream INFO: task hung in _vm_unmap_aliases (2) modules 1 881d 881d 0/28 auto-obsoleted due to no activity on 2023/04/08 08:01
Last patch testing requests (10)
Created Duration User Patch Repo Result
2025/04/28 22:39 33m retest repro upstream error
2025/04/28 22:39 1h08m retest repro upstream error
2025/04/28 22:39 33m retest repro upstream error
2025/04/28 22:39 33m retest repro upstream error
2025/04/28 22:39 33m retest repro upstream error
2025/04/28 18:53 33m retest repro upstream error
2025/04/28 18:53 1h08m retest repro upstream error
2025/04/28 18:53 1h48m retest repro upstream error
2025/04/28 16:59 1h39m retest repro upstream error
2025/04/28 16:22 33m retest repro upstream error

Sample crash report:
INFO: task kworker/1:1:88 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:1     state:D stack:0     pid:88    tgid:88    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df98dd84 r8:00000002 r7:60000113 r6:df98dd8c r5:83b54800
 r4:83b54800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83b54800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df98de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502d200
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83b54800 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df965000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ff078c r4:84ff0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84ff078c r4:8394b680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83b54800 r8:8394b6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8394b680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8394b680 r8:80287e08 r7:df879e60 r6:8394b700 r5:83b54800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf98dfb0 to 0xdf98dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8394ea00
INFO: task kworker/1:1:88 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
INFO: task kworker/0:2:3111 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:2     state:D stack:0     pid:3111  tgid:3111  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df9c5d84 r8:00000002 r7:60000113 r6:df9c5d8c r5:83b50c00
 r4:83b50c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83b50c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e01e40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83b50c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e4893000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8511378c r4:85113400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8511378c r4:84c30000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83b50c00 r8:84c3002c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84c30000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84c30000 r8:80287e08 r7:df845e60 r6:84c30300 r5:83b50c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9c5fb0 to 0xdf9c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:83e71e40
INFO: task kworker/0:2:3111 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
INFO: task kworker/0:4:3114 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:4     state:D stack:0     pid:3114  tgid:3114  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df9d9d84 r8:00000002 r7:60000113 r6:df9d9d8c r5:83b52400
 r4:83b52400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83b52400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa940
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83b52400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbfb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e6538c r4:84e65000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e6538c r4:84c30180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83b52400 r8:84c301ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84c30180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84c30180 r8:80287e08 r7:df9c5e60 r6:84c30380 r5:83b52400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9d9fb0 to 0xdf9d9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8454e600
INFO: task kworker/0:4:3114 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
INFO: task kworker/1:3:3115 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:3     state:D stack:0     pid:3115  tgid:3115  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df9cdd84 r8:00000002 r7:60000113 r6:df9cdd8c r5:841ca400
 r4:841ca400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:841ca400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9cde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505a2c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:841ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df997000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ebdb8c r4:84ebd800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84ebdb8c r4:8454f980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:841ca400 r8:8454f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8454f980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8454f980 r8:80287e08 r7:df98de60 r6:8454fd00 r5:841ca400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9cdfb0 to 0xdf9cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8457b5c0
INFO: task kworker/1:3:3115 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
INFO: task kworker/0:5:3118 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:5     state:D stack:0     pid:3118  tgid:3118  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df9e5d84 r8:00000002 r7:60000113 r6:df9e5d8c r5:841c8000
 r4:841c8000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:841c8000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa09c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:841c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0df000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e48a5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85013b8c r4:85013800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85013b8c r4:84c30200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:841c8000 r8:84c3022c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84c30200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84c30200 r8:80287e08 r7:df9c5e60 r6:8454fd80 r5:841c8000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9e5fb0 to 0xdf9e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84c11140
INFO: task kworker/0:5:3118 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
INFO: task kworker/0:6:3119 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:6     state:D stack:0     pid:3119  tgid:3119  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df9edd84 r8:00000002 r7:60000113 r6:df9edd8c r5:841c9800
 r4:841c9800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:841c9800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9ede08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0d080
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:841c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f011000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df991000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850c378c r4:850c3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:850c378c r4:84c30480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:841c9800 r8:84c304ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84c30480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84c30480 r8:80287e08 r7:df9c5e60 r6:8454fe00 r5:841c9800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9edfb0 to 0xdf9edff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84c27580
INFO: task kworker/0:6:3119 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
INFO: task kworker/0:7:3123 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:7     state:D stack:0     pid:3123  tgid:3123  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df9fdd84 r8:00000002 r7:60000113 r6:df9fdd8c r5:841c8c00
 r4:841c8c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:841c8c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9fde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e09d40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:841c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f011000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9c7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8514938c r4:85149000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8514938c r4:84c30580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:841c8c00 r8:84c305ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84c30580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84c30580 r8:80287e08 r7:df9c5e60 r6:8454f080 r5:841c8c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9fdfb0 to 0xdf9fdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84566f00
INFO: task kworker/0:7:3123 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
INFO: task kworker/0:8:3124 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:8     state:D stack:0     pid:3124  tgid:3124  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa05d84 r8:00000002 r7:60000113 r6:dfa05d8c r5:841cec00
 r4:841cec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:841cec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84301f40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:841cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f011000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df99d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85195b8c r4:85195800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85195b8c r4:84c30600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:841cec00 r8:84c3062c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84c30600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84c30600 r8:80287e08 r7:df9fde60 r6:843eba80 r5:841cec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa05fb0 to 0xdfa05ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84534540
INFO: task kworker/0:8:3124 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
INFO: task kworker/0:9:3127 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:9     state:D stack:0     pid:3127  tgid:3127  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa11d84 r8:00000002 r7:60000113 r6:dfa11d8c r5:841cd400
 r4:841cd400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:841cd400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e121c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:841cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dffc1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8514a38c r4:8514a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8514a38c r4:84c30680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:841cd400 r8:84c306ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84c30680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84c30680 r8:80287e08 r7:df9fde60 r6:843ebb00 r5:841cd400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa11fb0 to 0xdfa11ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845343c0
INFO: task kworker/0:9:3127 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
INFO: task kworker/0:10:3130 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:10    state:D stack:0     pid:3130  tgid:3130  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa31d84 r8:00000002 r7:60000113 r6:dfa31d8c r5:83865400
 r4:83865400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83865400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d54680
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83865400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa79000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8514af8c r4:8514ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8514af8c r4:84c30700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83865400 r8:84c3072c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84c30700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84c30700 r8:80287e08 r7:dfa11e60 r6:84727000 r5:83865400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa31fb0 to 0xdfa31ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8410ea40
INFO: task kworker/0:10:3130 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:11:3131 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:11    state:D stack:0     pid:3131  tgid:3131  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa35d84 r8:00000002 r7:60000013 r6:dfa35d8c r5:83861800
 r4:83861800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83861800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa35e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8458e180
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83861800 r7:00000000 r6:83018000 r5:00001000 r4:7f089000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead8f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8514bf8c r4:8514bc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8514bf8c r4:84c30400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83861800 r8:84c3042c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84c30400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84c30400 r8:80287e08 r7:dfa31e60 r6:84727200 r5:83861800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa35fb0 to 0xdfa35ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8457ae00
INFO: task kworker/0:11:3131 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:12:3133 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:12    state:D stack:0     pid:3133  tgid:3133  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa49d84 r8:00000002 r7:60000113 r6:dfa49d8c r5:83860c00
 r4:83860c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83860c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fb1c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83860c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadbb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b2f8c r4:853b2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:853b2f8c r4:84c30800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83860c00 r8:84c3082c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84c30800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84c30800 r8:80287e08 r7:dfa35e60 r6:8394bb80 r5:83860c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa49fb0 to 0xdfa49ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84574100
INFO: task kworker/0:12:3133 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:13:3134 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:13    state:D stack:0     pid:3134  tgid:3134  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa4dd84 r8:00000002 r7:60000113 r6:dfa4dd8c r5:83863c00
 r4:83863c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83863c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa4de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536a900
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83863c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb253000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8466838c r4:84668000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8466838c r4:84c30880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83863c00 r8:84c308ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84c30880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84c30880 r8:80287e08 r7:dfa49e60 r6:8394bb00 r5:83863c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa4dfb0 to 0xdfa4dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84574100
INFO: task kworker/0:13:3134 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:14:3137 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:14    state:D stack:0     pid:3137  tgid:3137  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa5dd84 r8:00000002 r7:60000113 r6:dfa5dd8c r5:83866000
 r4:83866000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83866000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e1c00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83866000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e8913000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8466938c r4:84669000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8466938c r4:84c30780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83866000 r8:84c307ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84c30780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84c30780 r8:80287e08 r7:dfa4de60 r6:83348880 r5:83866000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa5dfb0 to 0xdfa5dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845742c0
INFO: task kworker/0:14:3137 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:15:3140 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:15    state:D stack:0     pid:3140  tgid:3140  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa75d84 r8:00000002 r7:60000113 r6:dfa75d8c r5:83866c00
 r4:83866c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83866c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e1a40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83866c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e00e1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8466978c r4:84669400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8466978c r4:84c30980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83866c00 r8:84c309ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84c30980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84c30980 r8:80287e08 r7:dfa5de60 r6:83348800 r5:83866c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa75fb0 to 0xdfa75ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84574240
INFO: task kworker/0:15:3140 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:16:3141 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:16    state:D stack:0     pid:3141  tgid:3141  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa81d84 r8:00000002 r7:60000113 r6:dfa81d8c r5:83863000
 r4:83863000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83863000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467580
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83863000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eafad000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85496f8c r4:85496c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85496f8c r4:84c30a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83863000 r8:84c30aac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84c30a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84c30a80 r8:80287e08 r7:dfa75e60 r6:83353580 r5:83863000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa81fb0 to 0xdfa81ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84574600
INFO: task kworker/0:16:3141 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:17:3143 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:17    state:D stack:0     pid:3143  tgid:3143  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa89d84 r8:00000002 r7:60000113 r6:dfa89d8c r5:8425e000
 r4:8425e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8425e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa89e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467d00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8425e000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaad3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85339b8c r4:85339800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85339b8c r4:84c30900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8425e000 r8:84c3092c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84c30900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84c30900 r8:80287e08 r7:dfa81e60 r6:83353500 r5:8425e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa89fb0 to 0xdfa89ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84574540
INFO: task kworker/0:17:3143 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:18:3144 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:18    state:D stack:0     pid:3144  tgid:3144  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:8425bc00
 r4:8425bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8425bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84574540
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8425bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f011000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa3f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8533af8c r4:8533ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8533af8c r4:84c30b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8425bc00 r8:84c30b2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84c30b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84c30b00 r8:80287e08 r7:dfa89e60 r6:843cef00 r5:8425bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa91fb0 to 0xdfa91ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84574540
INFO: task kworker/0:18:3144 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:19:3146 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:19    state:D stack:0     pid:3146  tgid:3146  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfaa1d84 r8:00000002 r7:60000113 r6:dfaa1d8c r5:8425ec00
 r4:8425ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8425ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aec80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8425ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb77f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854d7f8c r4:854d7c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:854d7f8c r4:84c30c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8425ec00 r8:84c30c2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84c30c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84c30c00 r8:80287e08 r7:dfa91e60 r6:843cee00 r5:8425ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfaa1fb0 to 0xdfaa1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845746c0
INFO: task kworker/0:19:3146 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   945ae000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:20:3148 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:20    state:D stack:0     pid:3148  tgid:3148  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df9d1d84 r8:00000002 r7:60000113 r6:df9d1d8c r5:83b4d400
 r4:83b4d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83b4d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85464ec0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83b4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb5b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8466a78c r4:8466a400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8466a78c r4:84c30b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83b4d400 r8:84c30bac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84c30b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84c30b80 r8:80287e08 r7:dfaa1e60 r6:84c30100 r5:83b4d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9d1fb0 to 0xdf9d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84574780
INFO: task kworker/0:20:3148 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   945ae000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:21:3151 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:21    state:D stack:0     pid:3151  tgid:3151  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfaa5d84 r8:00000002 r7:60000013 r6:dfaa5d8c r5:83b56000
 r4:83b56000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83b56000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8530a680
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83b56000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa97000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8466ab8c r4:8466a800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8466ab8c r4:84c30c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83b56000 r8:84c30cac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84c30c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84c30c80 r8:80287e08 r7:dfaa1e60 r6:84c30d00 r5:83b56000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfaa5fb0 to 0xdfaa5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84574a00
INFO: task kworker/0:21:3151 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   945ae000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:22:3152 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:22    state:D stack:0     pid:3152  tgid:3152  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa19d84 r8:00000002 r7:60000113 r6:dfa19d8c r5:83393000
 r4:83393000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83393000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa19e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f80e80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83393000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb5fb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8560bb8c r4:8560b800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8560bb8c r4:84c30d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83393000 r8:84c30dac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84c30d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84c30d80 r8:80287e08 r7:dfaa1e60 r6:84c30a00 r5:83393000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa19fb0 to 0xdfa19ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84574a00
INFO: task kworker/0:22:3152 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:125:3554 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:125   state:D stack:0     pid:3554  tgid:3554  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0015d84 r8:00000002 r7:60000113 r6:e0015d8c r5:84d99800
 r4:84d99800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d99800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0015e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa140
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d99800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfec5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e53b8c r4:84e53800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e53b8c r4:84e78280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d99800 r8:84e782ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e78280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e78280 r8:80287e08 r7:dffe1e60 r6:84e78380 r5:84d99800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0015fb0 to 0xe0015ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e7b500
INFO: task kworker/0:125:3554 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:109:3572 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:109   state:D stack:0     pid:3572  tgid:3572  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e005dd84 r8:00000002 r7:60000113 r6:e005dd8c r5:84ce1800
 r4:84ce1800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ce1800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e005de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f9ac00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ce1800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa09000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ebcb8c r4:84ebc800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84ebcb8c r4:84e06280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ce1800 r8:84e062ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e06280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e06280 r8:80287e08 r7:e0045e60 r6:84e78800 r5:84ce1800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe005dfb0 to 0xe005dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e08280
INFO: task kworker/1:109:3572 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:111:3576 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:111   state:D stack:0     pid:3576  tgid:3576  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dffe9d84 r8:00000002 r7:60000113 r6:dffe9d8c r5:84d8bc00
 r4:84d8bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d8bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffe9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e08a40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d8bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd65000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ebc38c r4:84ebc000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84ebc38c r4:84e06200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d8bc00 r8:84e0622c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e06200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e06200 r8:80287e08 r7:e005de60 r6:84e06380 r5:84d8bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe9fb0 to 0xdffe9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e08500
INFO: task kworker/1:111:3576 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:126:3579 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:126   state:D stack:0     pid:3579  tgid:3579  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0071d84 r8:00000002 r7:60000113 r6:e0071d8c r5:84d8e000
 r4:84d8e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d8e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0071e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa340
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d8e000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb51000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:847d6f8c r4:847d6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:847d6f8c r4:84e78900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d8e000 r8:84e7892c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e78900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e78900 r8:80287e08 r7:e0015e60 r6:84e06180 r5:84d8e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0071fb0 to 0xe0071ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dfa100
INFO: task kworker/0:126:3579 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:127:3580 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:127   state:D stack:0     pid:3580  tgid:3580  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0075d84 r8:00000002 r7:60000013 r6:e0075d8c r5:84d8a400
 r4:84d8a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d8a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0075e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa2c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d8a400 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df97f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e53f8c r4:84e53c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e53f8c r4:84e78a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d8a400 r8:84e78a2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e78a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e78a00 r8:80287e08 r7:e0071e60 r6:84e06300 r5:84d8a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0075fb0 to 0xe0075ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dfa100
INFO: task kworker/0:127:3580 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:128:3583 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:128   state:D stack:0     pid:3583  tgid:3583  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0081d84 r8:00000002 r7:60000113 r6:e0081d8c r5:84d8ec00
 r4:84d8ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d8ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0081e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa440
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d8ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb6d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e6438c r4:84e64000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e6438c r4:84e78a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d8ec00 r8:84e78aac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e78a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e78a80 r8:80287e08 r7:df9d9e60 r6:84e06400 r5:84d8ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0081fb0 to 0xe0081ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dfa5c0
INFO: task kworker/0:128:3583 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:129:3586 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:129   state:D stack:0     pid:3586  tgid:3586  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0069d84 r8:00000002 r7:60000113 r6:e0069d8c r5:84ce2400
 r4:84ce2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ce2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0069e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa640
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ce2400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb95000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e6478c r4:84e64400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e6478c r4:84e78c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ce2400 r8:84e78cac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e78c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e78c80 r8:80287e08 r7:df9d9e60 r6:84e78980 r5:84ce2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0069fb0 to 0xe0069ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dfa480
INFO: task kworker/0:129:3586 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:130:3589 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:130   state:D stack:0     pid:3589  tgid:3589  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0085d84 r8:00000002 r7:60000013 r6:e0085d8c r5:84ce3c00
 r4:84ce3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ce3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0085e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa780
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ce3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e64b8c r4:84e64800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e64b8c r4:84e78b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ce3c00 r8:84e78bac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e78b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e78b80 r8:80287e08 r7:df9d9e60 r6:84e78b00 r5:84ce3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0085fb0 to 0xe0085ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dfaac0
INFO: task kworker/0:130:3589 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:131:3590 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:131   state:D stack:0     pid:3590  tgid:3590  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dffd9d84 r8:00000002 r7:60000113 r6:dffd9d8c r5:84ce4800
 r4:84ce4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ce4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffd9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa8c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ce4800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbd9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e64f8c r4:84e64c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e64f8c r4:84e78d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ce4800 r8:84e78d2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e78d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e78d00 r8:80287e08 r7:df9d9e60 r6:84e78c00 r5:84ce4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd9fb0 to 0xdffd9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dfaac0
INFO: task kworker/0:131:3590 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:132:3593 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:132   state:D stack:0     pid:3593  tgid:3593  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0095d84 r8:00000002 r7:60000013 r6:e0095d8c r5:84ce5400
 r4:84ce5400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ce5400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0095e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfac00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ce5400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc27000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e6578c r4:84e65400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e6578c r4:84e78d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ce5400 r8:84e78dac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e78d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e78d80 r8:80287e08 r7:df9d9e60 r6:84e78f00 r5:84ce5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0095fb0 to 0xe0095ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dfa980
INFO: task kworker/0:132:3593 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:133:3594 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:133   state:D stack:0     pid:3594  tgid:3594  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e008dd84 r8:00000002 r7:60000013 r6:e008dd8c r5:84ce6000
 r4:84ce6000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ce6000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e008de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8454e500
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ce6000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc65000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e65f8c r4:84e65c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e65f8c r4:84e78e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ce6000 r8:84e78e2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e78e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e78e00 r8:80287e08 r7:e0095e60 r6:84e78e80 r5:84ce6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe008dfb0 to 0xe008dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dfa980
INFO: task kworker/0:133:3594 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:134:3596 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:134   state:D stack:0     pid:3596  tgid:3596  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0099d84 r8:00000002 r7:60000113 r6:e0099d8c r5:84ce6c00
 r4:84ce6c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ce6c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0099e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfae00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ce6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc47000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e65b8c r4:84e65800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e65b8c r4:84e11100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ce6c00 r8:84e1112c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11100 r8:80287e08 r7:e008de60 r6:84e11000 r5:84ce6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0099fb0 to 0xe0099ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dfabc0
INFO: task kworker/0:134:3596 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:135:3598 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:135   state:D stack:0     pid:3598  tgid:3598  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e00a1d84 r8:00000002 r7:60000013 r6:e00a1d8c r5:84d94800
 r4:84d94800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d94800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00a1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e7b940
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d94800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc83000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e6638c r4:84e66000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e6638c r4:84e11080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d94800 r8:84e110ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11080 r8:80287e08 r7:e008de60 r6:84e11200 r5:84d94800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00a1fb0 to 0xe00a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e7bdc0
INFO: task kworker/0:135:3598 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:136:3600 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:136   state:D stack:0     pid:3600  tgid:3600  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e00a5d84 r8:00000002 r7:60000013 r6:e00a5d8c r5:84d8c800
 r4:84d8c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d8c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00a5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74280
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d8c800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfdbd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e66f8c r4:84e66c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e66f8c r4:84e11280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d8c800 r8:84e112ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11280 r8:80287e08 r7:e00a1e60 r6:84e06480 r5:84d8c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00a5fb0 to 0xe00a5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e7bdc0
INFO: task kworker/0:136:3600 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:137:3603 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:137   state:D stack:0     pid:3603  tgid:3603  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e009dd84 r8:00000002 r7:60000013 r6:e009dd8c r5:84d8b000
 r4:84d8b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d8b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e009de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d8b000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd85000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e6678c r4:84e66400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e6678c r4:84e11180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d8b000 r8:84e111ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11180 r8:80287e08 r7:e00a5e60 r6:84e06500 r5:84d8b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe009dfb0 to 0xe009dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e74100
INFO: task kworker/0:137:3603 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:138:3606 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:138   state:D stack:0     pid:3606  tgid:3606  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e00b5d84 r8:00000002 r7:60000013 r6:e00b5d8c r5:84d88c00
 r4:84d88c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d88c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00b5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74200
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d88c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfda7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e66b8c r4:84e66800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e66b8c r4:84e11400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d88c00 r8:84e1142c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11400 r8:80287e08 r7:e00a5e60 r6:84e06680 r5:84d88c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00b5fb0 to 0xe00b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e741c0
INFO: task kworker/0:138:3606 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:139:3608 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:139   state:D stack:0     pid:3608  tgid:3608  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e00bdd84 r8:00000002 r7:60000113 r6:e00bdd8c r5:84d8d400
 r4:84d8d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d8d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00bde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74480
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d8d400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfded000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e6738c r4:84e67000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e6738c r4:84e11380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d8d400 r8:84e113ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11380 r8:80287e08 r7:e00a5e60 r6:84e06580 r5:84d8d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00bdfb0 to 0xe00bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e742c0
INFO: task kworker/0:139:3608 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:140:3609 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:140   state:D stack:0     pid:3609  tgid:3609  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e00c1d84 r8:00000002 r7:60000113 r6:e00c1d8c r5:84d88000
 r4:84d88000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d88000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00c1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74880
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d88000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe47000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e67f8c r4:84e67c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e67f8c r4:84e11500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d88000 r8:84e1152c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11500 r8:80287e08 r7:e00bde60 r6:84e06600 r5:84d88000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00c1fb0 to 0xe00c1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e74440
INFO: task kworker/0:140:3609 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:141:3610 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:141   state:D stack:0     pid:3610  tgid:3610  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e00c5d84 r8:00000002 r7:60000113 r6:e00c5d8c r5:84f4bc00
 r4:84f4bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f4bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00c5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74500
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84f4bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe09000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e6778c r4:84e67400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e6778c r4:84e11580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f4bc00 r8:84e115ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11580 r8:80287e08 r7:e00c1e60 r6:84e06700 r5:84f4bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00c5fb0 to 0xe00c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e74440
INFO: task kworker/0:141:3610 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:112:3612 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:112   state:D stack:0     pid:3612  tgid:3612  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e00cdd84 r8:00000002 r7:60000113 r6:e00cdd8c r5:841f3000
 r4:841f3000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:841f3000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00cde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f9a240
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:841f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0527000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ebc78c r4:84ebc400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84ebc78c r4:84e06780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:841f3000 r8:84e067ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e06780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e06780 r8:80287e08 r7:e005de60 r6:84e06800 r5:841f3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00cdfb0 to 0xe00cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f813c0
INFO: task kworker/1:112:3612 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:142:3613 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:142   state:D stack:0     pid:3613  tgid:3613  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e00d1d84 r8:00000002 r7:60000013 r6:e00d1d8c r5:84ca0000
 r4:84ca0000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ca0000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00d1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74700
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ca0000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe33000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e67b8c r4:84e67800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e67b8c r4:84e11480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ca0000 r8:84e114ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11480 r8:80287e08 r7:e00c1e60 r6:84e06880 r5:84ca0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00d1fb0 to 0xe00d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e74540
INFO: task kworker/0:142:3613 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:143:3616 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:143   state:D stack:0     pid:3616  tgid:3616  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e00d5d84 r8:00000002 r7:60000113 r6:e00d5d8c r5:84ca0c00
 r4:84ca0c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ca0c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00d5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74c00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ca0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfea9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e70b8c r4:84e70800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e70b8c r4:84e11300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ca0c00 r8:84e1132c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11300 r8:80287e08 r7:e00c1e60 r6:84e06900 r5:84ca0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00d5fb0 to 0xe00d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e74840
INFO: task kworker/0:143:3616 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:144:3617 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:144   state:D stack:0     pid:3617  tgid:3617  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e00d9d84 r8:00000002 r7:60000013 r6:e00d9d8c r5:84ca1800
 r4:84ca1800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ca1800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00d9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74a00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ca1800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe69000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e7038c r4:84e70000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e7038c r4:84e11680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ca1800 r8:84e116ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11680 r8:80287e08 r7:e00d5e60 r6:84e06980 r5:84ca1800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00d9fb0 to 0xe00d9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e74980
INFO: task kworker/0:144:3617 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:145:3621 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:145   state:D stack:0     pid:3621  tgid:3621  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e00e5d84 r8:00000002 r7:60000113 r6:e00e5d8c r5:84ca3c00
 r4:84ca3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ca3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00e5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74b40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ca3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe81000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e7078c r4:84e70400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e7078c r4:84e11780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ca3c00 r8:84e117ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11780 r8:80287e08 r7:e00d5e60 r6:84e06a00 r5:84ca3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00e5fb0 to 0xe00e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e74a80
INFO: task kworker/0:145:3621 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:146:3622 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:146   state:D stack:0     pid:3622  tgid:3622  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e00e9d84 r8:00000002 r7:60000113 r6:e00e9d8c r5:84ca2400
 r4:84ca2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ca2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00e9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74d40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ca2400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e70f8c r4:84e70c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e70f8c r4:84e11600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ca2400 r8:84e1162c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11600 r8:80287e08 r7:e00d5e60 r6:84e06a80 r5:84ca2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00e9fb0 to 0xe00e9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e74c40
INFO: task kworker/0:146:3622 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:147:3624 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:147   state:D stack:0     pid:3624  tgid:3624  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e00f1d84 r8:00000002 r7:60000113 r6:e00f1d8c r5:84ca5400
 r4:84ca5400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ca5400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00f1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfaf80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ca5400 r7:00000000 r6:83018000 r5:00001000 r4:7f089000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff0d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e71b8c r4:84e71800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e71b8c r4:84e11880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ca5400 r8:84e118ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11880 r8:80287e08 r7:e00e9e60 r6:84e06b00 r5:84ca5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00f1fb0 to 0xe00f1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e74c40
INFO: task kworker/0:147:3624 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:148:3625 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:148   state:D stack:0     pid:3625  tgid:3625  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e00f5d84 r8:00000002 r7:60000113 r6:e00f5d8c r5:84ca3000
 r4:84ca3000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ca3000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00f5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74e80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ca3000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfef5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e7138c r4:84e71000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e7138c r4:84e11700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ca3000 r8:84e1172c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11700 r8:80287e08 r7:e00f1e60 r6:84e06b80 r5:84ca3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00f5fb0 to 0xe00f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e74f80
INFO: task kworker/0:148:3625 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:149:3627 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:149   state:D stack:0     pid:3627  tgid:3627  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e00fdd84 r8:00000002 r7:60000113 r6:e00fdd8c r5:84ca4800
 r4:84ca4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ca4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00fde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e08d80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ca4800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff03000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e7178c r4:84e71400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e7178c r4:84e11800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ca4800 r8:84e1182c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11800 r8:80287e08 r7:e00f1e60 r6:84e06c00 r5:84ca4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00fdfb0 to 0xe00fdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e74dc0
INFO: task kworker/0:149:3627 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:150:3630 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:150   state:D stack:0     pid:3630  tgid:3630  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0111d84 r8:00000002 r7:60000113 r6:e0111d8c r5:84d89800
 r4:84d89800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d89800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0111e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90580
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d89800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dffc9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e7338c r4:84e73000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e7338c r4:84e11a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d89800 r8:84e11a2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11a00 r8:80287e08 r7:e00f1e60 r6:84e06c80 r5:84d89800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0111fb0 to 0xe0111ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dfae80
INFO: task kworker/0:150:3630 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:151:3631 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:151   state:D stack:0     pid:3631  tgid:3631  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0115d84 r8:00000002 r7:60000113 r6:e0115d8c r5:84ca8000
 r4:84ca8000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ca8000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0115e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e7b100
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ca8000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff1b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e71f8c r4:84e71c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e71f8c r4:84e11980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ca8000 r8:84e119ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11980 r8:80287e08 r7:e0111e60 r6:84e06d00 r5:84ca8000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0115fb0 to 0xe0115ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e08680
INFO: task kworker/0:151:3631 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:152:3633 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:152   state:D stack:0     pid:3633  tgid:3633  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e011dd84 r8:00000002 r7:60000013 r6:e011dd8c r5:84ca9800
 r4:84ca9800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ca9800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e011de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ca9800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff25000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e7238c r4:84e72000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e7238c r4:84e11a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ca9800 r8:84e11aac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11a80 r8:80287e08 r7:e0111e60 r6:84e06d80 r5:84ca9800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe011dfb0 to 0xe011dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f90080
INFO: task kworker/0:152:3633 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:153:3635 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:153   state:D stack:0     pid:3635  tgid:3635  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0125d84 r8:00000002 r7:60000113 r6:e0125d8c r5:84ca8c00
 r4:84ca8c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ca8c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0125e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90180
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ca8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff99000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e7278c r4:84e72400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e7278c r4:84e11b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ca8c00 r8:84e11b2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11b00 r8:80287e08 r7:e0111e60 r6:84e06e00 r5:84ca8c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0125fb0 to 0xe0125ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f90280
INFO: task kworker/0:153:3635 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:154:3637 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:154   state:D stack:0     pid:3637  tgid:3637  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0131d84 r8:00000002 r7:60000113 r6:e0131d8c r5:84caa400
 r4:84caa400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84caa400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0131e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90300
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84caa400 r7:00000000 r6:83018000 r5:00001000 r4:7f091000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dffab000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e72b8c r4:84e72800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e72b8c r4:84e11c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84caa400 r8:84e11c2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11c00 r8:80287e08 r7:e0111e60 r6:84e06e80 r5:84caa400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0131fb0 to 0xe0131ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f90140
INFO: task kworker/0:154:3637 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:155:3639 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:155   state:D stack:0     pid:3639  tgid:3639  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0139d84 r8:00000002 r7:60000113 r6:e0139d8c r5:84cab000
 r4:84cab000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84cab000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0139e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90440
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84cab000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dffb7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e72f8c r4:84e72c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e72f8c r4:84e11c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84cab000 r8:84e11cac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11c80 r8:80287e08 r7:e0111e60 r6:84e06f00 r5:84cab000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0139fb0 to 0xe0139ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f902c0
INFO: task kworker/0:155:3639 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:156:3642 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:156   state:D stack:0     pid:3642  tgid:3642  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e044dd84 r8:00000002 r7:60000113 r6:e044dd8c r5:84cac800
 r4:84cac800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84cac800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e044de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f906c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84cac800 r7:00000000 r6:83018000 r5:00001000 r4:7f097000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dffd5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e7378c r4:84e73400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e7378c r4:84e11d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84cac800 r8:84e11d2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11d00 r8:80287e08 r7:e0111e60 r6:84e06f80 r5:84cac800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe044dfb0 to 0xe044dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f904c0
INFO: task kworker/0:156:3642 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:157:3644 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:157   state:D stack:0     pid:3644  tgid:3644  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0459d84 r8:00000002 r7:60000113 r6:e0459d8c r5:84cad400
 r4:84cad400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84cad400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0459e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90740
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84cad400 r7:00000000 r6:83018000 r5:00001000 r4:7f099000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e013f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e73b8c r4:84e73800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e73b8c r4:84e11d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84cad400 r8:84e11dac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11d80 r8:80287e08 r7:e044de60 r6:84df8d80 r5:84cad400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0459fb0 to 0xe0459ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f90600
INFO: task kworker/0:157:3644 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:158:3646 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:158   state:D stack:0     pid:3646  tgid:3646  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0461d84 r8:00000002 r7:60000113 r6:e0461d8c r5:84caec00
 r4:84caec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84caec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0461e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90c80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84caec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e048b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84fb4b8c r4:84fb4800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84fb4b8c r4:84e11900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84caec00 r8:84e1192c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11900 r8:80287e08 r7:e0459e60 r6:84df8f80 r5:84caec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0461fb0 to 0xe0461ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f90600
INFO: task kworker/0:158:3646 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:159:3647 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:159   state:D stack:0     pid:3647  tgid:3647  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0469d84 r8:00000002 r7:60000113 r6:e0469d8c r5:84cabc00
 r4:84cabc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84cabc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0469e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90900
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84cabc00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0455000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e73f8c r4:84e73c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e73f8c r4:84e11e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84cabc00 r8:84e11e2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11e00 r8:80287e08 r7:e0461e60 r6:84df8800 r5:84cabc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0469fb0 to 0xe0469ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f90a00
INFO: task kworker/0:159:3647 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:160:3650 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:160   state:D stack:0     pid:3650  tgid:3650  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e047dd84 r8:00000002 r7:60000113 r6:e047dd8c r5:84cae000
 r4:84cae000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84cae000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e047de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90a80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84cae000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e046f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84fb438c r4:84fb4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84fb438c r4:84e11f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84cae000 r8:84e11f2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11f00 r8:80287e08 r7:e0461e60 r6:84fa8000 r5:84cae000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe047dfb0 to 0xe047dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f90780
INFO: task kworker/0:160:3650 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:161:3651 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:161   state:D stack:0     pid:3651  tgid:3651  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0481d84 r8:00000002 r7:60000013 r6:e0481d8c r5:84cb0000
 r4:84cb0000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84cb0000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0481e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90c00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84cb0000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0475000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84fb478c r4:84fb4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84fb478c r4:84e11f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84cb0000 r8:84e11fac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e11f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e11f80 r8:80287e08 r7:e0461e60 r6:84fa8080 r5:84cb0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0481fb0 to 0xe0481ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f90a40
INFO: task kworker/0:161:3651 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:162:3653 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:162   state:D stack:0     pid:3653  tgid:3653  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0495d84 r8:00000002 r7:60000113 r6:e0495d8c r5:84cb1800
 r4:84cb1800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84cb1800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0495e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f81040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84cb1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e04ab000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84fb538c r4:84fb5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84fb538c r4:84fa2000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84cb1800 r8:84fa202c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84fa2000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fa2000 r8:80287e08 r7:e0461e60 r6:84fa8100 r5:84cb1800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0495fb0 to 0xe0495ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f90bc0
INFO: task kworker/0:162:3653 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:163:3656 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:163   state:D stack:0     pid:3656  tgid:3656  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e04a5d84 r8:00000002 r7:60000113 r6:e04a5d8c r5:84cb0c00
 r4:84cb0c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84cb0c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04a5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90e40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84cb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0491000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84fb4f8c r4:84fb4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84fb4f8c r4:84fa2180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84cb0c00 r8:84fa21ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84fa2180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fa2180 r8:80287e08 r7:e0495e60 r6:84fa8180 r5:84cb0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04a5fb0 to 0xe04a5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f90cc0
INFO: task kworker/0:163:3656 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:164:3657 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:164   state:D stack:0     pid:3657  tgid:3657  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e04a9d84 r8:00000002 r7:60000113 r6:e04a9d8c r5:84cb3c00
 r4:84cb3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84cb3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04a9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90ec0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84cb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e04b1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84fb578c r4:84fb5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84fb578c r4:84fa2200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84cb3c00 r8:84fa222c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84fa2200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fa2200 r8:80287e08 r7:e0495e60 r6:84fa8200 r5:84cb3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04a9fb0 to 0xe04a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f90d80
INFO: task kworker/0:164:3657 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:165:3659 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:165   state:D stack:0     pid:3659  tgid:3659  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e04b9d84 r8:00000002 r7:60000113 r6:e04b9d8c r5:84cb4800
 r4:84cb4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84cb4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04b9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faf480
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84cb4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e04e1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84fb678c r4:84fb6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84fb678c r4:84fa2080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84cb4800 r8:84fa20ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84fa2080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fa2080 r8:80287e08 r7:e04a9e60 r6:84fa8280 r5:84cb4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04b9fb0 to 0xe04b9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f81dc0
INFO: task kworker/0:165:3659 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:166:3662 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:166   state:D stack:0     pid:3662  tgid:3662  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e04d1d84 r8:00000002 r7:60000013 r6:e04d1d8c r5:84cb2400
 r4:84cb2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84cb2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faf040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84cb2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e04c3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84fb5b8c r4:84fb5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84fb5b8c r4:84fa2300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84cb2400 r8:84fa232c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84fa2300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fa2300 r8:80287e08 r7:e04b9e60 r6:84fa8300 r5:84cb2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04d1fb0 to 0xe04d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84faf080
INFO: task kworker/0:166:3662 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
      Not tainted 6.15.0-rc6-syzkaller #0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84fb5f8c r4:84fb5c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84fb5f8c r4:84fa2280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ce3000 r8:84fa22ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84fa2280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fa2280 r8:80287e08 r7:e04b9e60 r6:84fa2400 r5:84ce3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00c9fb0 to 0xe00c9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84faf280
INFO: task kworker/0:167:3663 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:168:3666 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
Workqueue: events bpf_prog_free_deferred
 r10:8291a684 r9:e04d9d84 r8:00000002 r7:60000113 r6:e04d9d8c r5:841f5400
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faf340
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:841f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e04db000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84fb638c r4:84fb6000
 r7:dddced80 r6:83018000 r5:84fb638c r4:84fa2380
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:8291a684 r9:e04e5d84 r8:00000002 r7:60000013 r6:e04e5d8c r5:84d9d400
 r5:84d9d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04e5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faf8c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d9d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0503000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84fb738c r4:84fb7000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84fb738c r4:84fa2100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d9d400 r8:84fa212c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84fa2100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fa2100 r8:80287e08 r7:e04b9e60 r6:84fa2580 r5:84d9d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04e5fb0 to 0xe04e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84faf3c0
INFO: task kworker/0:169:3669 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e04edd84 r8:00000002 r7:60000013 r6:e04edd8c r5:84cf0000
 r4:84cf0000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84cf0000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04ede08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faf5c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84cf0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e04ef000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84fb6b8c r4:84fb6800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84fb6b8c r4:84fa2600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84cf0000 r8:84fa262c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84fa2600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fa2600 r8:80287e08 r7:e04e5e60 r6:84fa2480 r5:84cf0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04edfb0 to 0xe04edff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84faf500
INFO: task kworker/0:170:3670 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:171:3672 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:171   state:D stack:0     pid:3672  tgid:3672  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r10:8291a684 r9:e04f9d84 r8:00000002 r7:60000113 r6:e04f9d8c r5:84cf0c00
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faf780
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84cf0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:61c88647 r9:84cf0c00 r8:84fa26ac r7:82804d40 r6:dddced80 r5:dddceda0
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:172:3674 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:172   state:D stack:0     pid:3674  tgid:3674  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r5:84cf2400 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/0:173:3676 blocked for more than 452 seconds.
 r10:8291a684 r9:e0519d84 r8:00000002 r7:60000113 r6:e0519d8c r5:84cf3c00
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fafc80
 r5:00001000 r4:e050f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84fb7b8c r4:84fb7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84fb7b8c r4:84fa2980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84cf3c00 r8:84fa29ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84fa2980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fa2980 r8:80287e08 r7:e0501e60 r6:84fa2a80 r5:84cf3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0519fb0 to 0xe0519ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84fafa80
INFO: task kworker/0:173:3676 is blocked on a mutex likely owned by task kworker/0:123:3540.
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e051de08
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
 r4:84faf940
Workqueue: events bpf_prog_free_deferred
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
 r4:00000000
 r5:84e5378c r4:84e53400
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:175:3679 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:175   state:D stack:0     pid:3679  tgid:3679  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0525d84 r8:00000002 r7:60000013 r6:e0525d8c r5:84cb6000
 r4:84cb6000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84cb6000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0525e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502d040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84cb6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e052d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ff038c r4:84ff0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84ff038c r4:84fa2a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84cb6000 r8:84fa2a2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84fa2a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fa2a00 r8:80287e08 r7:e051de60 r6:84fa8400 r5:84cb6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0525fb0 to 0xe0525ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84fafe40
INFO: task kworker/0:175:3679 is blocked on a mutex likely owned by task kworker/0:123:3540.
Call trace: 
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:84cb6c00 r8:84fa2bac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84fa2b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fa2b80 r8:80287e08 r7:e0525e60 r6:84fa8480 r5:84cb6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00adfb0 to 0xe00adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8502d100
INFO: task kworker/0:176:3683 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84d87ac0
 r5:84cb3000 r4:8291a680
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
task:kworker/0:178   state:D stack:0     pid:3687  tgid:3687  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0539e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502dc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84cf1800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa93000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ff178c r4:84ff1400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84ff178c r4:84fa2b00
 r10:61c88647 r9:84cf1800 r8:84fa2b2c r7:82804d40 r6:dddced80 r5:dddceda0
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace: 
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/1:113:3690 blocked for more than 452 seconds.
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0549d84 r8:00000002 r7:60000113 r6:e0549d8c r5:84cf5400
 r4:84cf5400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84cf5400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0549e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8457b980
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84cf5400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa3d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ebcf8c r4:84ebcc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84ebcf8c r4:84fa8500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84cf5400 r8:84fa852c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fa8500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fa8500 r8:80287e08 r7:e005de60 r6:84fa2c80 r5:84cf5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0549fb0 to 0xe0549ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8457b640
INFO: task kworker/1:113:3690 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r5:00001000 r4:dfeb3000
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:179:3692 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:179   state:D stack:0     pid:3692  tgid:3692  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e054dd84 r8:00000002 r7:60000013 r6:e054dd8c r5:84cf6000
 r4:84cf6000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84cf6000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e054de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:00001000 r4:dfa69000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ff138c r4:84ff1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84ff138c r4:84fa2880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84cf6000 r8:84fa28ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84fa2880
 r10:00000000 r9:84fa2880 r8:80287e08 r7:e0539e60 r6:84fa2d80 r5:84cf6000
INFO: task kworker/0:179:3692 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r5:84e5378c r4:84e53400
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:84ebd78c r4:84ebd400
 r10:61c88647 r9:84cf6c00 r8:84fa86ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:180:3696 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:180   state:D stack:0     pid:3696  tgid:3696  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0555d84 r8:00000002 r7:60000113 r6:e0555d8c r5:84ca6c00
 r4:84ca6c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502dd80
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Workqueue: events bpf_prog_free_deferred
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:115:3698 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:115   state:D stack:0     pid:3698  tgid:3698  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0575e08
 r5:84ebd38c r4:84ebd000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
INFO: task kworker/1:115:3698 is blocked on a mutex likely owned by task kworker/0:123:3540.
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:181:3699 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r5:84cb9800 r4:8291a680
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502d1c0
 r5:84ff278c r4:84ff2400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:00000000
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r4:00000000
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
      Not tainted 6.15.0-rc6-syzkaller #0
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e057de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502df00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84cba400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfaed000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ff1f8c r4:84ff1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84ff1f8c r4:8502b000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84cba400 r8:8502b02c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8502b000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8502b000 r8:80287e08 r7:e0579e60 r6:84fa8880 r5:84cba400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe057dfb0 to 0xe057dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8502de00
INFO: task kworker/0:182:3700 is blocked on a mutex likely owned by task kworker/0:123:3540.
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:00000000
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
 r4:84e0be80
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:183:3702 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:183   state:D stack:0     pid:3702  tgid:3702  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0585d84 r8:00000002 r7:60000013 r6:e0585d8c r5:84cb8000
 r4:84cb8000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84cb8000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0585e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:84ff238c r4:84ff2000
 r10:61c88647 r9:84cb8000 r8:8502b12c r7:82804d40 r6:dddced80 r5:dddceda0
Call trace: 
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r10:8291a684 r9:e058dd84 r8:00000002 r7:60000013 r6:e058dd8c r5:84cbb000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r5:800f0013 r4:80239bb0
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r4:84cbd400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84cbd400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:82ac21e4
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
INFO: task kworker/0:186:3708 blocked for more than 452 seconds.
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ff978c r4:84ff9400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84ff978c r4:8502b380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84cbc800 r8:8502b3ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8502b380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8502b380 r8:80287e08 r7:e058de60 r6:84fa8a80 r5:84cbc800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05b9fb0 to 0xe05b9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:85036280
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:8291a684 r9:e05c9d84 r8:00000002 r7:60000013 r6:e05c9d8c r5:84cbbc00
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r5:84cbe000 r4:8291a680
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05e9fb0 to 0xe05e9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:850362c0
INFO: task kworker/0:188:3712 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0605d84 r8:00000002 r7:60000013 r6:e0605d8c r5:84cbec00
 r4:84cbec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84cbec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0605e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850364c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r5:84ff3b8c r4:84ff3800
 r10:61c88647 r9:84cbec00 r8:8502b52c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85036600
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0615d84 r8:00000002 r7:60000113 r6:e0615d8c r5:85068c00
 r4:85068c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85068c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0615e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850366c0
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:8502b200
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:dffe1dc0
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:191:3719 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:191   state:D stack:0     pid:3719  tgid:3719  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0621d84 r8:00000002 r7:60000113 r6:e0621d8c r5:85068000
 r4:85068000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r5:84ff838c r4:84ff8000
 r7:dddced80 r6:83018000 r5:84ff838c r4:8502b400
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:8506b000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:84ff878c r4:84ff8400
 r7:dddced80 r6:83018000 r5:84ff878c r4:8502b680
 r10:61c88647 r9:8506b000 r8:8502b6ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8502b680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8502b680 r8:80287e08 r7:e05b9e60 r6:84fa8d80 r5:8506b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0625fb0 to 0xe0625ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85036740
INFO: task kworker/0:192:3720 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:193:3723 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:193   state:D stack:0     pid:3723  tgid:3723  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0631d84 r8:00000002 r7:60000113 r6:e0631d8c r5:8506c800
 r4:8506c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8506c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0631e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85036a80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8506c800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e000b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ff8b8c r4:84ff8800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84ff8b8c r4:8502b600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8506c800 r8:8502b62c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8502b600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8502b600 r8:80287e08 r7:e05b9e60 r6:84fa8e00 r5:8506c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0631fb0 to 0xe0631ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85036880
INFO: task kworker/0:193:3723 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r5:800f0013 r4:80239bb0
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:194:3724 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:194   state:D stack:0     pid:3724  tgid:3724  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0635d84 r8:00000002 r7:60000013 r6:e0635d8c r5:8506a400
 r4:8506a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8506a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0635e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85036c00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8506a400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0019000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ff8f8c r4:84ff8c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84ff8f8c r4:8502b700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8506a400 r8:8502b72c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8502b700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8502b700 r8:80287e08 r7:e05b9e60 r6:84fa8e80 r5:8506a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0635fb0 to 0xe0635ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:850369c0
INFO: task kworker/0:194:3724 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:195:3726 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:195   state:D stack:0     pid:3726  tgid:3726  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0545d84 r8:00000002 r7:60000113 r6:e0545d8c r5:84cf3000
 r4:84cf3000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84cf3000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0545e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85036c80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84cf3000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0027000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ff938c r4:84ff9000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84ff938c r4:8502b780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84cf3000 r8:8502b7ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8502b780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8502b780 r8:80287e08 r7:e05b9e60 r6:8502b800 r5:84cf3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0545fb0 to 0xe0545ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85036bc0
INFO: task kworker/0:195:3726 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:196:3729 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:196   state:D stack:0     pid:3729  tgid:3729  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0639d84 r8:00000002 r7:60000113 r6:e0639d8c r5:84cf4800
 r4:84cf4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84cf4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0639e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050000
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84cf4800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0049000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ff9f8c r4:84ff9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84ff9f8c r4:8502b980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84cf4800 r8:8502b9ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8502b980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8502b980 r8:80287e08 r7:e05b9e60 r6:8502b580 r5:84cf4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0639fb0 to 0xe0639ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85036e40
INFO: task kworker/0:196:3729 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:197:3730 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:197   state:D stack:0     pid:3730  tgid:3730  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0641d84 r8:00000002 r7:60000113 r6:e0641d8c r5:84ec8000
 r4:84ec8000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ec8000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0641e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f9afc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ec8000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e003f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ff9b8c r4:84ff9800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84ff9b8c r4:8502b880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ec8000 r8:8502b8ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8502b880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8502b880 r8:80287e08 r7:e0639e60 r6:8502ba80 r5:84ec8000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0641fb0 to 0xe0641ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84fafd80
INFO: task kworker/0:197:3730 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:198:3733 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:198   state:D stack:0     pid:3733  tgid:3733  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0645d84 r8:00000002 r7:60000113 r6:e0645d8c r5:84ec8c00
 r4:84ec8c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ec8c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0645e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850503c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ec8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0061000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ffa78c r4:84ffa400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84ffa78c r4:8502b900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ec8c00 r8:8502b92c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8502b900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8502b900 r8:80287e08 r7:e0639e60 r6:8502bb00 r5:84ec8c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0645fb0 to 0xe0645ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85050200
INFO: task kworker/0:198:3733 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:199:3735 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:199   state:D stack:0     pid:3735  tgid:3735  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e053dd84 r8:00000002 r7:60000113 r6:e053dd8c r5:84eca400
 r4:84eca400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84eca400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e053de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050140
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84eca400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0057000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ffa38c r4:84ffa000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84ffa38c r4:8502bb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84eca400 r8:8502bbac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8502bb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8502bb80 r8:80287e08 r7:e0645e60 r6:8502ba00 r5:84eca400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe053dfb0 to 0xe053dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85050080
INFO: task kworker/0:199:3735 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:200:3738 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:200   state:D stack:0     pid:3738  tgid:3738  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0649d84 r8:00000002 r7:60000013 r6:e0649d8c r5:84ecb000
 r4:84ecb000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ecb000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0649e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050640
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ecb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e05ad000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ffaf8c r4:84ffac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84ffaf8c r4:8502bc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ecb000 r8:8502bc2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8502bc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8502bc00 r8:80287e08 r7:e0645e60 r6:8502bd00 r5:84ecb000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0649fb0 to 0xe0649ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85050380
INFO: task kworker/0:200:3738 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:201:3739 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:201   state:D stack:0     pid:3739  tgid:3739  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e064dd84 r8:00000002 r7:60000013 r6:e064dd8c r5:84ecc800
 r4:84ecc800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ecc800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e064de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050440
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ecc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e059f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ffab8c r4:84ffa800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84ffab8c r4:8502bd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ecc800 r8:8502bdac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8502bd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8502bd80 r8:80287e08 r7:e0649e60 r6:8502be80 r5:84ecc800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe064dfb0 to 0xe064dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85050480
INFO: task kworker/0:201:3739 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:202:3741 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:202   state:D stack:0     pid:3741  tgid:3741  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0655d84 r8:00000002 r7:60000013 r6:e0655d8c r5:84ecd400
 r4:84ecd400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ecd400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0655e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050900
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ecd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e05d7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ffb38c r4:84ffb000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84ffb38c r4:8502bc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ecd400 r8:8502bcac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8502bc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8502bc80 r8:80287e08 r7:e0649e60 r6:8502be00 r5:84ecd400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0655fb0 to 0xe0655ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85050600
INFO: task kworker/0:202:3741 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:203:3742 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:203   state:D stack:0     pid:3742  tgid:3742  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0659d84 r8:00000002 r7:60000113 r6:e0659d8c r5:84ece000
 r4:84ece000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ece000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0659e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85047c00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ece000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e007b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ffbf8c r4:84ffbc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84ffbf8c r4:84fa2f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ece000 r8:84fa2fac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84fa2f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fa2f80 r8:80287e08 r7:e0655e60 r6:84fa2e80 r5:84ece000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0659fb0 to 0xe0659ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85050a00
INFO: task kworker/0:203:3742 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:204:3744 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:204   state:D stack:0     pid:3744  tgid:3744  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e065dd84 r8:00000002 r7:60000113 r6:e065dd8c r5:84ec9800
 r4:84ec9800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ec9800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e065de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8f200
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ec9800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e04a1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8501038c r4:85010000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8501038c r4:8502bf00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ec9800 r8:8502bf2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8502bf00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8502bf00 r8:80287e08 r7:e0659e60 r6:8502bf80 r5:84ec9800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe065dfb0 to 0xe065dff8)
dfa0:                                     00000000 00000000 00000000 00000000
 r4:850508c0
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r5:800f0013 r4:80239bb0
 r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:116:3746 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:116   state:D stack:0     pid:3746  tgid:3746  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0671d84 r8:00000002 r7:60000013 r6:e0671d8c r5:84ec1800
 r4:84ec1800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ec1800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0671e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505a440
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ec1800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb6b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ebdf8c r4:84ebdc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84ebdf8c r4:8505b080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ec1800 r8:8505b0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8505b080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8505b080 r8:80287e08 r7:e0551e60 r6:8505b180 r5:84ec1800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0671fb0 to 0xe0671ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8505a100
INFO: task kworker/1:116:3746 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:117:3750 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:117   state:D stack:0     pid:3750  tgid:3750  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0651d84 r8:00000002 r7:60000113 r6:e0651d8c r5:8506bc00
 r4:8506bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8506bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0651e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505a4c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8506bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb9d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ebe38c r4:84ebe000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84ebe38c r4:8505b000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8506bc00 r8:8505b02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8505b000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8505b000 r8:80287e08 r7:e0671e60 r6:8505b280 r5:8506bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0651fb0 to 0xe0651ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8505a280
INFO: task kworker/1:117:3750 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:118:3753 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:118   state:D stack:0     pid:3753  tgid:3753  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e045dd84 r8:00000002 r7:60000113 r6:e045dd8c r5:84ec0c00
 r4:84ec0c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ec0c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e045de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505a980
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ec0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc3b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ebef8c r4:84ebec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84ebef8c r4:8505b100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ec0c00 r8:8505b12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8505b100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8505b100 r8:80287e08 r7:e0651e60 r6:85054000 r5:84ec0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe045dfb0 to 0xe045dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8505a500
INFO: task kworker/1:118:3753 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:205:3755 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:205   state:D stack:0     pid:3755  tgid:3755  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0485d84 r8:00000002 r7:60000113 r6:e0485d8c r5:84ec3c00
 r4:84ec3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ec3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0485e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850479c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ec3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff15000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ffbb8c r4:84ffb800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84ffbb8c r4:85054080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ec3c00 r8:850540ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85054080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85054080 r8:80287e08 r7:e0659e60 r6:85054100 r5:84ec3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0485fb0 to 0xe0485ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85047000
INFO: task kworker/0:205:3755 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:119:3756 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:119   state:D stack:0     pid:3756  tgid:3756  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0499d84 r8:00000002 r7:60000113 r6:e0499d8c r5:84ec0000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fa0:                                     00000000 00000000 00000000 00000000
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:800f0013 r4:80239bb0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:120:3757 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:120   state:D stack:0     pid:3757  tgid:3757  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e049dd84 r8:00000002 r7:60000013 r6:e049dd8c r5:84ec2400
 r4:84ec2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ec2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e049de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505a840
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ec2400 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc03000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ebeb8c r4:84ebe800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:84ec2400 r8:8505b32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8505a5c0
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:84e0be80
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:121:3760 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:121   state:D stack:0     pid:3760  tgid:3760  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e04bdd84 r8:00000002 r7:60000013 r6:e04bdd8c r5:84ec4800
 r4:84ec4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:84ebf38c r4:84ebf000
 r10:61c88647 r9:84ec4800 r8:8505b4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
INFO: task kworker/1:121:3760 is blocked on a mutex likely owned by task kworker/0:123:3540.
 r4:82ac21e4
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
task:kworker/1:122   state:D stack:0     pid:3762  tgid:3762  ppid:2      task_flags:0x4208060 flags:0x00000000
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:84ebf78c r4:84ebf400
 r4:8505b500
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:8291a684 r9:e067dd84 r8:00000002 r7:60000013 r6:e067dd8c r5:84ec6000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505ad00
 r5:84ebfb8c r4:84ebf800
 r4:8505b580
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
task:kworker/1:124   state:D stack:0     pid:3766  tgid:3766  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505aec0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ec6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfdbb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ebff8c r4:84ebfc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84ebff8c r4:8505b600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ec6c00 r8:8505b62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8505b600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8505b600 r8:80287e08 r7:e067de60 r6:85054400 r5:84ec6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0681fb0 to 0xe0681ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8505ad40
INFO: task kworker/1:124:3766 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84e0be80
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018205 r8:84ec3000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
task:kworker/1:126   state:D stack:0     pid:3770  tgid:3770  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:84ecec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0691e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050700
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ecec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe23000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8421a38c r4:8421a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8421a38c r4:8505b680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ecec00 r8:8505b6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8505b680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8505b680 r8:80287e08 r7:e068de60 r6:85054500 r5:84ecec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0691fb0 to 0xe0691ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8457b640
INFO: task kworker/1:126:3770 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:127   state:D stack:0     pid:3772  tgid:3772  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0695d84 r8:00000002 r7:60000013 r6:e0695d8c r5:84ecbc00
 r4:84ecbc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ecbc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0695e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85032e00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ecbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe55000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850a038c r4:850a0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850a038c r4:8505b780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ecbc00 r8:8505b7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8505b780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8505b780 r8:80287e08 r7:e0691e60 r6:85054580 r5:84ecbc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0695fb0 to 0xe0695ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85050f40
INFO: task kworker/1:127:3772 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
1d60: 80230ad0 80239bb0 800f0013 ffffffff
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
 r5:84c38000 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504a040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84c38000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe7f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850a078c r4:850a0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850a078c r4:8505b800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84c38000 r8:8505b82c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8505b800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8505b800 r8:80287e08 r7:e0695e60 r6:85054600 r5:84c38000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0699fb0 to 0xe0699ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85050cc0
INFO: task kworker/1:128:3774 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84d87ac0
 r10:8291a684 r9:e069dd84 r8:00000002 r7:60000113 r6:e069dd8c r5:84c38c00
 r4:00000000
 r5:850a0b8c r4:850a0800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84c38c00 r8:8505b8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8505b880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8505b880 r8:80287e08 r7:e0699e60 r6:8505b700 r5:84c38c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe069dfb0 to 0xe069dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8504a280
INFO: task kworker/1:129:3777 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:130   state:D stack:0     pid:3779  tgid:3779  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0661d84 r8:00000002 r7:60000113 r6:e0661d8c r5:85069800
 r4:85069800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85069800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0661e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504a540
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85069800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff05000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850a138c r4:850a1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850a138c r4:8505b980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85069800 r8:8505b9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8505b980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8505b980 r8:80287e08 r7:e069de60 r6:8505b900 r5:85069800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0661fb0 to 0xe0661ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8504a2c0
INFO: task kworker/1:130:3779 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:131:3780 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:131   state:D stack:0     pid:3780  tgid:3780  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0079d84 r8:00000002 r7:60000113 r6:e0079d8c r5:8506d400
 r4:8506d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8506d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0079e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504a3c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8506d400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfef3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850a0f8c r4:850a0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850a0f8c r4:8505b380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8506d400 r8:8505b3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8505b380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8505b380 r8:80287e08 r7:e0661e60 r6:8505ba00 r5:8506d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0079fb0 to 0xe0079ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8504a380
INFO: task kworker/1:131:3780 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:132:3782 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:132   state:D stack:0     pid:3782  tgid:3782  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e06a5d84 r8:00000002 r7:60000113 r6:e06a5d8c r5:84ca6000
 r4:84ca6000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ca6000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504a840
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ca6000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff8f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850a178c r4:850a1400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850a178c r4:8505ba80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ca6000 r8:8505baac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8505ba80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8505ba80 r8:80287e08 r7:e0661e60 r6:8505bc00 r5:84ca6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06a5fb0 to 0xe06a5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8504a5c0
INFO: task kworker/1:132:3782 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
task:kworker/1:133   state:D stack:0     pid:3785  tgid:3785  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e06a9d84 r8:00000002 r7:60000113 r6:e06a9d8c r5:8506e000
 r4:8506e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8506e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504a980
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dffa7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850a1b8c r4:850a1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850a1b8c r4:8505bb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8506e000 r8:8505bb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8505bb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8505bb00 r8:80287e08 r7:e06a5e60 r6:8505bd00 r5:8506e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06a9fb0 to 0xe06a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8504a600
INFO: task kworker/1:133:3785 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:134:3788 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:134   state:D stack:0     pid:3788  tgid:3788  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e06a1d84 r8:00000002 r7:60000013 r6:e06a1d8c r5:8506ec00
 r4:8506ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8506ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504aa80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8506ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dffbf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850a1f8c r4:850a1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850a1f8c r4:8505bb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8506ec00 r8:8505bbac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8505bb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8505bb80 r8:80287e08 r7:e06a9e60 r6:8505bd80 r5:8506ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06a1fb0 to 0xe06a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8504a8c0
INFO: task kworker/1:134:3788 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:135:3789 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:135   state:D stack:0     pid:3789  tgid:3789  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0479d84 r8:00000002 r7:60000113 r6:e0479d8c r5:85070c00
 r4:85070c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85070c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0479e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504ac80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85070c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dffd3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850a238c r4:850a2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850a238c r4:8505be00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85070c00 r8:8505be2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8505be00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8505be00 r8:80287e08 r7:e06a1e60 r6:8505bf00 r5:85070c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0479fb0 to 0xe0479ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8504ad40
INFO: task kworker/1:135:3789 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:136:3791 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:136   state:D stack:0     pid:3791  tgid:3791  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e06b5d84 r8:00000002 r7:60000113 r6:e06b5d8c r5:85071800
 r4:85071800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85071800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850531c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85071800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e00b1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850a2f8c r4:850a2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850a2f8c r4:8505bc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85071800 r8:8505bcac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8505bc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8505bc80 r8:80287e08 r7:e0479e60 r6:8505be80 r5:85071800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06b5fb0 to 0xe06b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8504ac40
INFO: task kworker/1:136:3791 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:206:3793 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:206   state:D stack:0     pid:3793  tgid:3793  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e06b9d84 r8:00000002 r7:60050013 r6:e06b9d8c r5:85072400
 r4:85072400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85072400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:85054680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85054680 r8:80287e08 r7:e0659e60 r6:8505bf80 r5:85072400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06b9fb0 to 0xe06b9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85047c80
INFO: task kworker/0:206:3793 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:207:3794 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850a278c r4:850a2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:850a278c r4:85054780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85073000 r8:850547ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85054780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85054780 r8:80287e08 r7:e06b9e60 r6:84fa8f00 r5:85073000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06bdfb0 to 0xe06bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85047c80
INFO: task kworker/0:207:3794 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
1d20:                   a2162000 eca77000 00000001 80239b98 7f035000 00000001
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:85073c00 r8:8505482c r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:208:3798 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:208   state:D stack:0     pid:3798  tgid:3798  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e06c5d84 r8:00000002 r7:60000113 r6:e06c5d8c r5:85074800
 r4:85074800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85074800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8f5c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85074800 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e04e7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8501078c r4:85010400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8501078c r4:8504e100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85074800 r8:8504e12c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8504e100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8504e100 r8:80287e08 r7:e06b9e60 r6:85054700 r5:85074800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06c5fb0 to 0xe06c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85047cc0
INFO: task kworker/0:208:3798 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a2162000 eca77000 00000001 80239b98 7f035000 00000001
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:138:3800 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:138   state:D stack:0     pid:3800  tgid:3800  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e06c1d84 r8:00000002 r7:60000013 r6:e06c1d8c r5:85075400
 r5:85075400 r4:8291a680
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r4:00000000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850a338c r4:850a3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:85054a00
 r10:00000000 r9:85054a00 r8:80287e08 r7:e06b5e60 r6:85054880 r5:85075400
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r5:00001000 r4:dfeb3000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06cde08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85054980 r8:80287e08 r7:e06c1e60 r6:85054b80 r5:85076c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06cdfb0 to 0xe06cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85053400
INFO: task kworker/1:139:3801 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:140:3804 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:140   state:D stack:0     pid:3804  tgid:3804  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e06d1d84 r8:00000002 r7:60000113 r6:e06d1d8c r5:85076000
 r4:85076000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85076000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85053900
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85076000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e010d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850a3f8c r4:850a3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850a3f8c r4:85054a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85076000 r8:85054aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85054a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85054a80 r8:80287e08 r7:e06cde60 r6:85054c80 r5:85076000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06d1fb0 to 0xe06d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85053640
INFO: task kworker/1:140:3804 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:141:3806 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:141   state:D stack:0     pid:3806  tgid:3806  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e06d9d84 r8:00000002 r7:60000113 r6:e06d9d8c r5:84c3bc00
 r4:84c3bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84c3bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85053880
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850a3b8c r4:850a3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850a3b8c r4:85054b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84c3bc00 r8:85054b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85054b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85054b00 r8:80287e08 r7:e06d1e60 r6:8504e000 r5:84c3bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06d9fb0 to 0xe06d9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85053840
INFO: task kworker/1:141:3806 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a2162000 eca77000 00000001 80239b98 7f035000 00000001
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
 r10:8291a684 r9:e06e1d84 r8:00000002 r7:60000113 r6:e06e1d8c r5:84c39800
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:61c88647 r9:84c39800 r8:85054dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
Call trace: 
 r4:82ac21e4
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r5:84c3ec00 r4:8291a680
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85053ac0
INFO: task kworker/1:143:3811 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:144:3812 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:144   state:D stack:0     pid:3812  tgid:3812  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e06f1d84 r8:00000002 r7:60000113 r6:e06f1d8c r5:84c3c800
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r5:00001000 r4:dfeb3000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:84d87ac0
task:kworker/1:145   state:D stack:0     pid:3813  tgid:3813  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e06f5d84 r8:00000002 r7:60000113 r6:e06f5d8c r5:84c3d400
 r4:84c3d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84c3d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85053d80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84c3d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e013b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850a8b8c r4:850a8800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850a8b8c r4:85054e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84c3d400 r8:85054eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85054e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85054e80 r8:80287e08 r7:e06ede60 r6:8504e280 r5:84c3d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06f5fb0 to 0xe06f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85053bc0
INFO: task kworker/1:145:3813 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a3561000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
INFO: task kworker/1:146:3815 blocked for more than 453 seconds.
 r10:8291a684 r9:e06fdd84 r8:00000002 r7:60000013 r6:e06fdd8c r5:84c3a400
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r7:ddde2d80 r6:83018200 r5:850a8f8c r4:85054f80
 r4:00000001
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r5:800f0013 r4:80239bb0
 r4:82ac21e4
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:00000000
 r5:00001000 r4:dfeb3000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:147:3818 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:147   state:D stack:0     pid:3818  tgid:3818  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e05bdd84 r8:00000002 r7:60000113 r6:e05bdd8c r5:84c40c00
 r5:84c40c00 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85047b40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84c40c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9ba000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850a978c r4:850a9400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850a978c r4:8503c080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84c40c00 r8:8503c0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8503c080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8503c080 r8:80287e08 r7:e06ede60 r6:8504e380 r5:84c40c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05bdfb0 to 0xe05bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d60: 80230ad0 80239bb0 800f0013 ffffffff
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:dffe1dc0
 r4:00000000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fa0:                                     00000000 00000000 00000000 00000000
INFO: task kworker/1:148:3820 blocked for more than 453 seconds.
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r5:84c40000 r4:8291a680
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e061de08
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:149:3822 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:149   state:D stack:0     pid:3822  tgid:3822  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0705d84 r8:00000002 r7:60000113 r6:e0705d8c r5:84c43000
 r4:84c43000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84c43000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0705e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85034700
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84c43000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc8f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r7:ddde2d80 r6:83018200 r5:850aaf8c r4:8503c180
 r10:00000000 r9:8503c180 r8:80287e08 r7:e061de60 r6:8504e480 r5:84c43000
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
1d20:                   a415f000 eca77000 00000001 80239b98 7f035000 00000001
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:84e0be80
 r4:00000001
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850341c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84c41800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa55000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850a9f8c r4:850a9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850a9f8c r4:8503c280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84c41800 r8:8503c2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8503c280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8503c280 r8:80287e08 r7:e0705e60 r6:8504e500 r5:84c41800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0709fb0 to 0xe0709ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85034140
INFO: task kworker/1:150:3823 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a44f6000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:151:3825 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:151   state:D stack:0     pid:3825  tgid:3825  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0711d84 r8:00000002 r7:60000113 r6:e0711d8c r5:84c42400
 r4:84c42400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84c42400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0711e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85034300
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84c42400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa8d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850aa38c r4:850aa000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850aa38c r4:8503c000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84c42400 r8:8503c02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8503c000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8503c000 r8:80287e08 r7:e0705e60 r6:8504e580 r5:84c42400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0711fb0 to 0xe0711ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85034180
INFO: task kworker/1:151:3825 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r4:00000000
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:84e0be80
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r5:850aa78c r4:850aa400
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fa0:                                     00000000 00000000 00000000 00000000
 r4:84d87ac0
      Not tainted 6.15.0-rc6-syzkaller #0
Workqueue: events bpf_prog_free_deferred
 r5:85070000 r4:8291a680
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:85070000 r8:8503c42c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8503c400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8503c400 r8:80287e08 r7:e0705e60 r6:8503c480 r5:85070000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06c9fb0 to 0xe06c9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85034380
INFO: task kworker/1:153:3829 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a49b7000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:154:3832 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:154   state:D stack:0     pid:3832  tgid:3832  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0721d84 r8:00000002 r7:60000013 r6:e0721d8c r5:85080000
 r4:85080000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85080000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0721e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85034b40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85080000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd5f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850abb8c r4:850ab800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:85080000 r8:8503c3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
Exception stack(0xe0721fb0 to 0xe0721ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r4:82ac21e4
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fa0:                                     00000000 00000000 00000000 00000000
 r4:84d87ac0
      Not tainted 6.15.0-rc6-syzkaller #0
Workqueue: events bpf_prog_free_deferred
 r4:85080c00
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r4:00000000
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85034780
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85080c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfcf7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850ab38c r4:850ab000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850ab38c r4:8503c580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85080c00 r8:8503c5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8503c580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8503c580 r8:80287e08 r7:e0721e60 r6:8503c680 r5:85080c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0725fb0 to 0xe0725ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85034a40
INFO: task kworker/1:155:3834 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a4dc4000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fa0:                                     00000000 00000000 00000000 00000000
INFO: task kworker/1:156:3836 blocked for more than 454 seconds.
 r4:85081800
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0729e08
 r5:00001000 r4:dfd2b000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r10:8291a684 r9:e072dd84 r8:00000002 r7:60000013 r6:e072dd8c r5:85082400
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85034cc0
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850abf8c r4:850abc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850abf8c r4:8503c700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85082400 r8:8503c72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8503c700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8503c700 r8:80287e08 r7:e0721e60 r6:8503c880 r5:85082400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe072dfb0 to 0xe072dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85034b00
INFO: task kworker/1:157:3838 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a538c000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:158:3839 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:158   state:D stack:0     pid:3839  tgid:3839  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e06d5d84 r8:00000002 r7:60000113 r6:e06d5d8c r5:85083c00
 r4:85083c00
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8503f7c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85083c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfff7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84ffb78c r4:84ffb400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:160:3844 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:160   state:D stack:0     pid:3844  tgid:3844  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0739d84 r8:00000002 r7:60000113 r6:e0739d8c r5:85084800
 r4:85084800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85084800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0739e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f9e140
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85084800 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0021000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850b478c r4:850b4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850b478c r4:8503c900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85084800 r8:8503c92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8503c900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8503c900 r8:80287e08 r7:e0731e60 r6:8503cb80 r5:85084800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0739fb0 to 0xe0739ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace: 
1d20:                   a5e68000 eca77000 00000001 80239b98 7f035000 00000001
 r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/1:161:3846 blocked for more than 454 seconds.
 r10:8291a684 r9:e0735d84 r8:00000002 r7:60000013 r6:e0735d8c r5:85083000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:85083000 r8:8503ca2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:162:3849 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:162   state:D stack:0     pid:3849  tgid:3849  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e073dd84 r8:00000002 r7:60000113 r6:e073dd8c r5:85086c00
 r4:85086c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85086c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e073de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f9e340
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850b4b8c r4:850b4800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xe073dfb0 to 0xe073dff8)
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r4:dffe1dc0
 r5:00001000 r4:dfeb3000
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850b4f8c r4:850b4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850b4f8c r4:8503cc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85086000 r8:8503cc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8503cc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8503cc00 r8:80287e08 r7:e0735e60 r6:8503cd00 r5:85086000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0741fb0 to 0xe0741ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f9e480
INFO: task kworker/1:163:3850 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a666b000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/1:164:3852 blocked for more than 454 seconds.
 r4:85088000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0749e08
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f9e940
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85088000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e046b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850b5b8c r4:850b5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850b5b8c r4:8503ce00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85088000 r8:8503ce2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8503ce00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8503ce00 r8:80287e08 r7:e0735e60 r6:8503cf00 r5:85088000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0749fb0 to 0xe0749ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f9e880
INFO: task kworker/1:164:3852 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a666b000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:00000001
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:165:3854 blocked for more than 454 seconds.
Workqueue: events bpf_prog_free_deferred
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r4:00000000
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:850b578c r4:850b5400
 r10:61c88647 r9:85088c00 r8:85054f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:00000001
Exception stack(0xe074dfb0 to 0xe074dff8)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:84f9e740
Workqueue: events bpf_prog_free_deferred
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d20:                   a6973000 eca77000 00000001 80239b98 7f035000 00000001
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:dffe1dc0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0759e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f9eac0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84c46000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0473000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850b5f8c r4:850b5c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850b5f8c r4:8503cf80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84c46000 r8:8503cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8503cf80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8503cf80 r8:80287e08 r7:e0749e60 r6:8504e680 r5:84c46000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0759fb0 to 0xe0759ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f9e740
INFO: task kworker/1:166:3856 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a6d31000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fa0:                                     00000000 00000000 00000000 00000000
INFO: task kworker/1:167:3858 blocked for more than 454 seconds.
Workqueue: events bpf_prog_free_deferred
 r10:8291a684 r9:e0761d84 r8:00000002 r7:60000113 r6:e0761d8c r5:84c45400
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r7:ddde2d80 r6:83018200 r5:850b638c r4:84f94100
 r10:61c88647 r9:84c45400 r8:84f9412c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84f94100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f94100 r8:80287e08 r7:e0759e60 r6:8504e800 r5:84c45400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0761fb0 to 0xe0761ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f9ea80
INFO: task kworker/1:167:3858 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a6d31000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
      Not tainted 6.15.0-rc6-syzkaller #0
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0765fb0 to 0xe0765ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f9ecc0
INFO: task kworker/1:168:3859 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a71e1000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
 r5:84e5378c r4:84e53400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:169   state:D stack:0     pid:3861  tgid:3861  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0769d84 r8:00000002 r7:60000113 r6:e0769d8c r5:84c3e000
 r4:84c3e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84c3e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0769e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:84c3e000 r8:84f9402c r7:82804d40 r6:ddde2d80 r5:ddde2da0
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:170:3865 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:170   state:D stack:0     pid:3865  tgid:3865  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f9eec0
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ed9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e04f3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850b778c r4:850b7400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850b778c r4:84f94200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ed9800 r8:84f9422c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84f94200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f94200 r8:80287e08 r7:e0765e60 r6:8504ea00 r5:84ed9800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0775fb0 to 0xe0775ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f9ea80
INFO: task kworker/1:171:3867 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a7c12000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:172:3869 blocked for more than 454 seconds.
Workqueue: events bpf_prog_free_deferred
 r4:84eda400
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8c040
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850b738c r4:850b7000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850b738c r4:84f94280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84eda400 r8:84f942ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84f94280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f94280 r8:80287e08 r7:e0775e60 r6:8504e900 r5:84eda400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe076dfb0 to 0xe076dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f8c100
INFO: task kworker/1:172:3869 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a7d67000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
 r5:84edb000 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xe0779fb0 to 0xe0779ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:174:3874 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:174   state:D stack:0     pid:3874  tgid:3874  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e077dd84 r8:00000002 r7:60000113 r6:e077dd8c r5:84edbc00
 r4:84edbc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84edbc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e077de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8c4c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84edbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e050d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850b7f8c r4:850b7c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850b7f8c r4:84f94480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84edbc00 r8:84f944ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84f94480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f94480 r8:80287e08 r7:e0779e60 r6:8504e980 r5:84edbc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe077dfb0 to 0xe077dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f8c180
INFO: task kworker/1:174:3874 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a8562000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84e0be80
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
      Not tainted 6.15.0-rc6-syzkaller #0
Workqueue: events bpf_prog_free_deferred
 r4:84edc800
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0781e08
 r9:83018205 r8:84edc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
 r5:850b878c r4:850b8400
 r10:61c88647 r9:84edc800 r8:84f9452c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r5:800f0013 r4:80239bb0
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:176:3878 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:176   state:D stack:0     pid:3878  tgid:3878  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0785d84 r8:00000002 r7:60000113 r6:e0785d8c r5:84edd400
 r4:84edd400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84edd400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0785e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8c640
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84edd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e051f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850b838c r4:850b8000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850b838c r4:84f94580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84edd400 r8:84f945ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84f94580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f94580 r8:80287e08 r7:e0781e60 r6:8504eb80 r5:84edd400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0785fb0 to 0xe0785ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f8c600
INFO: task kworker/1:176:3878 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a8918000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:209:3880 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:209   state:D stack:0     pid:3880  tgid:3880  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0791d84 r8:00000002 r7:60000013 r6:e0791d8c r5:84ede000
 r4:84ede000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ede000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0791e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8ff80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ede000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e05c1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85010b8c r4:85010800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85010b8c r4:8504ec00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ede000 r8:8504ec2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8504ec00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8504ec00 r8:80287e08 r7:e06b9e60 r6:8504ec80 r5:84ede000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0791fb0 to 0xe0791ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f8f940
INFO: task kworker/0:209:3880 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a8f07000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fa0:                                     00000000 00000000 00000000 00000000
 r10:8291a684 r9:e0795d84 r8:00000002 r7:60000113 r6:e0795d8c r5:84edec00
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8c8c0
 r9:83018205 r8:84edec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e053f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850b8b8c r4:850b8800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850b8b8c r4:84f94380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84edec00 r8:84f943ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84f94380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f94380 r8:80287e08 r7:e0781e60 r6:8504ed00 r5:84edec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0795fb0 to 0xe0795ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f8c6c0
INFO: task kworker/1:177:3881 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
task:kworker/1:178   state:D stack:0     pid:3883  tgid:3883  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8ca40
 r7:ddde2d80 r6:83018200 r5:850b8f8c r4:84f94600
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Call trace: 
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:179:3885 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:179   state:D stack:0     pid:3885  tgid:3885  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e079dd84 r8:00000002 r7:60000013 r6:e079dd8c r5:84c3b000
 r4:84c3b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84c3b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e079de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
 r9:83018205 r8:84c3b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
 r5:850b938c r4:850b9000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:84f94700 r8:80287e08 r7:e0799e60 r6:8504ee00 r5:84c3b000
 r4:84f8ca00
Call trace: 
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r5:800f0013 r4:80239bb0
 r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e07a1d84 r8:00000002 r7:60000013 r6:e07a1d8c r5:84fd0000
 r4:84fd0000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84fd0000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07a1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8cd80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84fd0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e05a1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850b9b8c r4:850b9800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850b9b8c r4:84f94780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84fd0000 r8:84f947ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84f94780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f94780 r8:80287e08 r7:e079de60 r6:8504ee80 r5:84fd0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe07a1fb0 to 0xe07a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f8c1c0
INFO: task kworker/1:180:3887 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a9bad000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fa0:                                     00000000 00000000 00000000 00000000
      Not tainted 6.15.0-rc6-syzkaller #0
 r4:84fd0c00
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07a5e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84fd0c00 r8:84f9482c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84f94800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f94800 r8:80287e08 r7:e07a1e60 r6:8504ef00 r5:84fd0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe07a5fb0 to 0xe07a5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f8c1c0
INFO: task kworker/1:181:3888 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a9fa7000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r5:84fd1800 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r9:83018205 r8:84fd1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000
 r5:850ba38c r4:850ba000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r4:dffe1dc0
 r5:00001000 r4:dfeb3000
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
task:kworker/1:183   state:D stack:0     pid:3894  tgid:3894  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8cf00
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r7:ddde2d80 r6:83018200 r5:850b9f8c r4:84f94680
 r10:00000000 r9:84f94680 r8:80287e08 r7:e07a9e60 r6:84e78f80 r5:84fd3000
 r4:84f8c1c0
INFO: task kworker/1:183:3894 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   aabd7000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:184:3896 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:184   state:D stack:0     pid:3896  tgid:3896  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e07b5d84 r8:00000002 r7:60000113 r6:e07b5d8c r5:84fd2400
 r4:84fd2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84fd2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85034f00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84fd2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0609000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850ba78c r4:850ba400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850ba78c r4:84f94880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84fd2400 r8:84f948ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84f94880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f94880 r8:80287e08 r7:e07a9e60 r6:84fa8f80 r5:84fd2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe07b5fb0 to 0xe07b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85034dc0
INFO: task kworker/1:184:3896 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   aabd7000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
Workqueue: events bpf_prog_free_deferred
 r5:84fd5400 r4:8291a680
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07c5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8a040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84fd5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e062b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850bab8c r4:850ba800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850bab8c r4:84f94900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84fd5400 r8:84f9492c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84f94900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f94900 r8:80287e08 r7:e07b5e60 r6:84e11b80 r5:84fd5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe07c5fb0 to 0xe07c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f8cf80
INFO: task kworker/1:185:3897 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   aae85000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:186:3899 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:186   state:D stack:0     pid:3899  tgid:3899  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e07c9d84 r8:00000002 r7:60000113 r6:e07c9d8c r5:84fd6000
 r4:84fd6000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84fd6000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07c9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8a3c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84fd6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000
 r5:850bb38c r4:850bb000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850bb38c r4:84f94a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84fd6000 r8:84f94a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84f94a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f94a00 r8:80287e08 r7:e07c5e60 r6:84e11e80 r5:84fd6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe07c9fb0 to 0xe07c9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f8cf80
INFO: task kworker/1:186:3899 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   aae85000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:187:3901 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:187   state:D stack:0     pid:3901  tgid:3901  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e07d1d84 r8:00000002 r7:60000113 r6:e07d1d8c r5:84fd4800
 r4:84fd4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84fd4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07d1e08
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850baf8c r4:850bac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:84fd4800 r8:84f949ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f8a000
INFO: task kworker/1:187:3901 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   aae85000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:210:3904 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:210   state:D stack:0     pid:3904  tgid:3904  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e07cdd84 r8:00000002 r7:60000113 r6:e07cdd8c r5:84fd6c00
 r4:84fd6c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84fd6c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07cde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f95c40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84fd6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e080f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8501178c r4:85011400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8501178c r4:84f86080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:84f86080
dfa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ab2dc000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:211:3905 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0801000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8501138c r4:85011000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8501138c r4:84f86100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84fd3c00 r8:84f8612c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84f86100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f86100 r8:80287e08 r7:e07cde60 r6:84f86180 r5:84fd3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe07d9fb0 to 0xe07d9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f95600
INFO: task kworker/0:211:3905 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   abe19000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018205 r8:84ed0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000
 r5:850bb78c r4:850bb400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fa0:                                     00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f8a380
INFO: task kworker/1:188:3907 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   abe19000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:189:3909 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:189   state:D stack:0     pid:3909  tgid:3909  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r5:84ed0c00 r4:8291a680
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r9:83018205 r8:84ed0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000
 r5:850bbb8c r4:850bb800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850bbb8c r4:84f94b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:84f94b80
 r10:00000000 r9:84f94b80 r8:80287e08 r7:e07e1e60 r6:84f86300 r5:84ed0c00
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:189:3909 is blocked on a mutex likely owned by task kworker/0:123:3540.
Call trace: 
 r4:00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d60: 80230ad0 80239bb0 800f0013 ffffffff
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:00000001
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:190:3912 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:190   state:D stack:0     pid:3912  tgid:3912  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0809d84 r8:00000002 r7:60000013 r6:e0809d8c r5:84ed2400
 r4:84ed2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ed2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0809e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8aa80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ed2400 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc57000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850bc78c r4:850bc400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850bc78c r4:84f94c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ed2400 r8:84f94cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84f94c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f94c80 r8:80287e08 r7:e07f9e60 r6:84f86380 r5:84ed2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0809fb0 to 0xe0809ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f8a600
INFO: task kworker/1:190:3912 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ac1b1000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:191:3914 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:191   state:D stack:0     pid:3914  tgid:3914  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0751d84 r8:00000002 r7:600b0113 r6:e0751d8c r5:84ed3000
 r4:84ed3000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ed3000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0751e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8af40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ed3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:850bbf8c r4:850bbc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:84f94d00 r8:80287e08 r7:e0809e60 r6:84f86400 r5:84ed3000
 r4:84f8a600
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:800f0013 r4:80239bb0
 r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:212:3916 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:212   state:D stack:0     pid:3916  tgid:3916  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0755d84 r8:00000002 r7:60000113 r6:e0755d8c r5:84ed3c00
 r4:84ed3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ed3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0755e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f954c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ed3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0833000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85011f8c r4:85011c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85011f8c r4:84f86500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ed3c00 r8:84f8652c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84f86500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f86500 r8:80287e08 r7:e07cde60 r6:84f86580 r5:84ed3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0755fb0 to 0xe0755ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f95c80
INFO: task kworker/0:212:3916 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   acf9a000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:213:3917 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:213   state:D stack:0     pid:3917  tgid:3917  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0825d84 r8:00000002 r7:60000013 r6:e0825d8c r5:84ed4800
 r4:84ed4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ed4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0825e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
 r9:83018005 r8:84ed4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000
 r5:85011b8c r4:85011800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:84f86480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f86480 r8:80287e08 r7:e0755e60 r6:84f86700 r5:84ed4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0825fb0 to 0xe0825ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f95f80
INFO: task kworker/0:213:3917 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   acf9a000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:214:3921 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:214   state:D stack:0     pid:3921  tgid:3921  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e082dd84 r8:00000002 r7:60000013 r6:e082dd8c r5:84ed5400
 r4:84ed5400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ed5400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e082de08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa0040
 r5:00001000 r4:e0839000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8501238c r4:85012000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8501238c r4:84f86600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ed5400 r8:84f8662c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84f86600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r5:00001000 r4:dfeb3000
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
task:kworker/0:215   state:D stack:0     pid:3924  tgid:3924  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84fa02c0
INFO: task kworker/0:215:3924 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ad72c000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:216:3926 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:216   state:D stack:0     pid:3926  tgid:3926  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0871d84 r8:00000002 r7:60000113 r6:e0871d8c r5:84ed6c00
 r4:84ed6c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ed6c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0871e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa06c0
 r4:00000000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8501338c r4:85013000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8501338c r4:84f86680
 r10:61c88647 r9:84ed6c00 r8:84f866ac r7:82804d40 r6:dddced80 r5:dddceda0
 r10:00000000 r9:84f86680 r8:80287e08 r7:e0845e60 r6:84f86a00 r5:84ed6c00
1fa0:                                     00000000 00000000 00000000 00000000
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:8291a684 r9:e0879d84 r8:00000002 r7:60000113 r6:e0879d8c r5:84fe8000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0879e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa0380
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84fe8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e086e000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85012b8c r4:85012800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85012b8c r4:84f86880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84fe8000 r8:84f868ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84f86880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f86880 r8:80287e08 r7:e0871e60 r6:84f86b00 r5:84fe8000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0879fb0 to 0xe0879ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84fa05c0
INFO: task kworker/0:217:3928 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ade89000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:218:3929 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:218   state:D stack:0     pid:3929  tgid:3929  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e083dd84 r8:00000002 r7:60000113 r6:e083dd8c r5:84fe8c00
 r4:84fe8c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84fe8c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e083de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa04c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84fe8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e087b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85012f8c r4:85012c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85012f8c r4:84f86980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84fe8c00 r8:84f869ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84f86980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f86980 r8:80287e08 r7:e0871e60 r6:84f86a80 r5:84fe8c00
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/0:218:3929 is blocked on a mutex likely owned by task kworker/0:123:3540.
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ade89000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:219:3932 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:219   state:D stack:0     pid:3932  tgid:3932  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e4885d84 r8:00000002 r7:60000013 r6:e4885d8c r5:84fe9800
 r4:84fe9800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84fe9800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4885e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa0840
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84fe9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e489f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8501378c r4:85013400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8501378c r4:84f86b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84fe9800 r8:84f86bac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84f86b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f86b80 r8:80287e08 r7:e0871e60 r6:84f86d00 r5:84fe9800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe4885fb0 to 0xe4885ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
      Not tainted 6.15.0-rc6-syzkaller #0
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa0b00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84fea400 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df99f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85013f8c r4:85013c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85013f8c r4:84f86c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84fea400 r8:84f86c2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84f86c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f86c00 r8:80287e08 r7:e4885e60 r6:84f86e00 r5:84fea400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe4891fb0 to 0xe4891ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84fa0800
INFO: task kworker/0:220:3936 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   aebb0000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:84fec800
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa4040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84fec800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd67000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850bcb8c r4:850bc800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850bcb8c r4:84f94c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84fec800 r8:84f94c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84f94c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f94c00 r8:80287e08 r7:e0809e60 r6:84f86c80 r5:84fec800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06e5fb0 to 0xe06e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f8acc0
INFO: task kworker/1:192:3944 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:193:3946 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:193   state:D stack:0     pid:3946  tgid:3946  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e48b9d84 r8:00000002 r7:60000113 r6:e48b9d8c r5:84feb000
 r4:84feb000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84feb000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:850bd78c r4:850bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:84feb000 r8:84f94dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
      Not tainted 6.15.0-rc6-syzkaller #0
 r4:84fed400
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4899e08
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850bcf8c r4:850bcc00
 r10:61c88647 r9:84fed400 r8:84f94aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
 r5:84fee000 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:84fee000 r8:84f86dac r7:82804d40 r6:dddced80 r5:dddceda0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   af3ac000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:222:3951 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:222   state:D stack:0     pid:3951  tgid:3951  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e48c1d84 r8:00000002 r7:60000013 r6:e48c1d8c r5:84feec00
 r4:84feec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84feec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48c1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa0d40
 r9:83018005 r8:84feec00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000
 r5:8511038c r4:85110000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:85030000 r8:80287e08 r7:e48bde60 r6:85030080 r5:84feec00
INFO: task kworker/0:222:3951 is blocked on a mutex likely owned by task kworker/0:123:3540.
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/0:223:3952 blocked for more than 455 seconds.
 r5:84febc00 r4:8291a680
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa0d00
 r5:850bc38c r4:850bc000
 r10:61c88647 r9:84febc00 r8:8503012c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85030100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85030100 r8:80287e08 r7:e48c1e60 r6:85030180 r5:84febc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe48c5fb0 to 0xe48c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8502c0c0
INFO: task kworker/0:223:3952 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b01fb000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:224:3953 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:224   state:D stack:0     pid:3953  tgid:3953  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e48c9d84 r8:00000002 r7:60000113 r6:e48c9d8c r5:84c58000
 r4:84c58000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84c58000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48c9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa1bc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84c58000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000
 r5:8511178c r4:85111400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8511178c r4:85030200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84c58000 r8:8503022c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85030200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85030200 r8:80287e08 r7:e48c5e60 r6:85030280 r5:84c58000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe48c9fb0 to 0xe48c9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8502c0c0
INFO: task kworker/0:224:3953 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b01fb000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:225:3954 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:225   state:D stack:0     pid:3954  tgid:3954  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e48cdd84 r8:00000002 r7:60000113 r6:e48cdd8c r5:84c58c00
 r4:84c58c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84c58c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48cde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502c6c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84c58c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeed000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8511078c r4:85110400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8511078c r4:85030300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84c58c00 r8:8503032c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85030300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85030300 r8:80287e08 r7:e48c9e60 r6:85030380 r5:84c58c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe48cdfb0 to 0xe48cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8502c0c0
INFO: task kworker/0:225:3954 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Call trace: 
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:195:3955 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:195   state:D stack:0     pid:3955  tgid:3955  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e48d1d84 r8:00000002 r7:60010113 r6:e48d1d8c r5:84c59800
 r4:84c59800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84c59800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48d1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa4380
 r4:00000000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:850bd38c r4:850bd000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:84c59800 r8:84f94f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b0911000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:196:3959 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:196   state:D stack:0     pid:3959  tgid:3959  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e07fdd84 r8:00000002 r7:60000013 r6:e07fdd8c r5:84c5bc00
 r4:84c5bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84c5bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07fde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa4500
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:850bdb8c r4:850bd800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:84c5bc00 r8:84f94fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:00000001
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:196:3959 is blocked on a mutex likely owned by task kworker/0:123:3540.
Call trace: 
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r5:00001000 r4:dfeb3000
 r5:84e5378c r4:84e53400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:197:3960 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:197   state:D stack:0     pid:3960  tgid:3960  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e48d9d84 r8:00000002 r7:60000013 r6:e48d9d8c r5:84c5c800
 r4:84c5c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84c5c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48d9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa4740
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84c5c800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff0b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850bdf8c r4:850bdc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850bdf8c r4:84f94e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84c5c800 r8:84f94eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84f94e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f94e80 r8:80287e08 r7:e07fde60 r6:85030600 r5:84c5c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe48d9fb0 to 0xe48d9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84fa4540
INFO: task kworker/1:197:3960 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b0dd4000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r9:83018205 r8:84c5e000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
5fa0:                                     00000000 00000000 00000000 00000000
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b1350000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
 r9:83018205 r8:84c5ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
 r4:84fb1180
INFO: task kworker/1:199:3963 is blocked on a mutex likely owned by task kworker/0:123:3540.
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
Workqueue: events bpf_prog_free_deferred
 r4:00000000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84fa4800
INFO: task kworker/1:200:3965 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b1b6a000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:201:3968 blocked for more than 455 seconds.
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:850bef8c r4:850bec00
 r7:ddde2d80 r6:83018200 r5:850bef8c r4:84fb1100
 r10:00000000 r9:84fb1100 r8:80287e08 r7:e48e5e60 r6:85030700 r5:84c5d400
 r4:84fa4ac0
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b1b6a000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
 r5:84c5b000 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85110f8c r4:85110c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85110f8c r4:85030780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84c5b000 r8:850307ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85030780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85030780 r8:80287e08 r7:e48c9e60 r6:85030800 r5:84c5b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe48f9fb0 to 0xe48f9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8502cc80
INFO: task kworker/0:226:3969 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b1e25000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
      Not tainted 6.15.0-rc6-syzkaller #0
 r10:8291a684 r9:e8909d84 r8:00000002 r7:60000113 r6:e8909d8c r5:850e8000
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:850bf78c r4:850bf400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:850e8000 r8:84fb12ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r5:00001000 r4:dfeb3000
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa4d00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0091000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850bf38c r4:850bf000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850bf38c r4:84fb1380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850e8c00 r8:84fb13ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fb1380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fb1380 r8:80287e08 r7:e8909e60 r6:85030900 r5:850e8c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe890dfb0 to 0xe890dff8)
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Workqueue: events bpf_prog_free_deferred
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:850c138c r4:850c1000
 r10:00000000 r9:84fb1400 r8:80287e08 r7:e8909e60 r6:85030980 r5:850eb000
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e891dd84 r8:00000002 r7:60000013 r6:e891dd8c r5:850e9800
 r4:850e9800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850e9800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e891de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8a980
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e00dd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r7:ddde2d80 r6:83018200 r5:850bfb8c r4:84fb1480
 r4:84f8a740
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
 r4:850ec800
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:850bff8c r4:850bfc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850bff8c r4:84fb1500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850ec800 r8:84fb152c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fb1500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fb1500 r8:80287e08 r7:e8919e60 r6:85030a80 r5:850ec800
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:850ed400
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r4:84fb1600
 r4:84fa4240
1d20:                   b3af1000 eca77000 00000001 80239b98 7f035000 00000001
 r4:84e0be80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r9:83018205 r8:850ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0117000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850c078c r4:850c0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850c078c r4:84fb1680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850ebc00 r8:84fb16ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fb1680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fb1680 r8:80287e08 r7:e8919e60 r6:85030b80 r5:850ebc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8935fb0 to 0xe8935ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84fa4240
INFO: task kworker/1:208:3982 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:00001000 r4:dfeb3000
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
 r5:850c0b8c r4:850c0800
Exception stack(0xe893dfb0 to 0xe893dff8)
 r4:00000000
 r4:dffe1dc0
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
      Not tainted 6.15.0-rc6-syzkaller #0
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48d5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f981c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8508b000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e013d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850c0f8c r4:850c0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850c0f8c r4:84fb1780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8508b000 r8:84fb17ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fb1780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fb1780 r8:80287e08 r7:e8919e60 r6:84fb1800 r5:8508b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe48d5fb0 to 0xe48d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f98080
INFO: task kworker/1:210:3986 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
1d60: 80230ad0 80239bb0 800f0013 ffffffff
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
 r5:8508e000 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:85110b8c r4:85110800
 r7:ddde2d80 r6:83018200 r5:85110b8c r4:84fb1880
 r10:00000000 r9:84fb1880 r8:80287e08 r7:e8919e60 r6:84fb1900 r5:8508e000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f983c0
INFO: task kworker/1:211:3988 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b407b000 eca77000 00000001 80239b98 7f035000 00000001
1d60: 80230ad0 80239bb0 800f0013 ffffffff
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/1:212:3991 blocked for more than 455 seconds.
 r4:8508ec00
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:850c178c r4:850c1400
 r7:ddde2d80 r6:83018200 r5:850c178c r4:84fb1580
 r10:00000000 r9:84fb1580 r8:80287e08 r7:e48b5e60 r6:84fb1700 r5:8508ec00
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
task:kworker/1:213   state:D stack:0     pid:3993  tgid:3993  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
 r4:00000000
 r5:8511138c r4:85111000
 r7:ddde2d80 r6:83018200 r5:8511138c r4:84fb1980
 r10:00000000 r9:84fb1980 r8:80287e08 r7:e8949e60 r6:84fb1b00 r5:8508d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe894dfb0 to 0xe894dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f98600
INFO: task kworker/1:213:3993 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b45a2000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:214:3995 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:214   state:D stack:0     pid:3995  tgid:3995  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e8951d84 r8:00000002 r7:60000113 r6:e8951d8c r5:8508bc00
 r4:8508bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8508bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850c1b8c r4:850c1800
 r10:61c88647 r9:8508bc00 r8:84fb1a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
task:kworker/0:227   state:D stack:0     pid:3997  tgid:3997  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0d400
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:850eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfcef000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8511238c r4:85112000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8511238c r4:85030d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850eec00 r8:85030d2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85030d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85030d00 r8:80287e08 r7:e48c9e60 r6:85030f80 r5:850eec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8945fb0 to 0xe8945ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84fa1b00
INFO: task kworker/0:227:3997 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b4e03000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:228:3999 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:228   state:D stack:0     pid:3999  tgid:3999  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e8965d84 r8:00000002 r7:60000113 r6:e8965d8c r5:850ea400
 r4:850ea400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r4:00000000
 r4:00000000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:85111b8c r4:85111800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85111b8c r4:85030e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850ea400 r8:85030eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85030e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85030e80 r8:80287e08 r7:e8945e60 r6:85030d80 r5:850ea400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8965fb0 to 0xe8965ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84fa1b00
INFO: task kworker/0:228:3999 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b4e03000 eca77000 00000001 80239b98 7f035000 00000001
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r4:dffe1dc0
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:215:4000 blocked for more than 455 seconds.
Workqueue: events bpf_prog_free_deferred
 r4:84ed1800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ed1800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e895de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f98e00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ed1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea98d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:850c238c r4:850c2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:84ed1800 r8:84fb1bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fb1b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fb1b80 r8:80287e08 r7:e8951e60 r6:85030f00 r5:84ed1800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe895dfb0 to 0xe895dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f98940
INFO: task kworker/1:215:4000 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b5257000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:229:4003 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:229   state:D stack:0     pid:4003  tgid:4003  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ea989d84 r8:00000002 r7:60000113 r6:ea989d8c r5:850f0c00
 r4:850f0c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850f0c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea989e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0d380
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:850f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb2f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85111f8c r4:85111c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85111f8c r4:85030c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850f0c00 r8:85030cac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85030c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85030c80 r8:80287e08 r7:e8945e60 r6:85030e00 r5:850f0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea989fb0 to 0xea989ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84fa1f40
INFO: task kworker/0:229:4003 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b5257000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:216:4004 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:216   state:D stack:0     pid:4004  tgid:4004  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ea991d84 r8:00000002 r7:60000113 r6:ea991d8c r5:850f1800
 r4:850f1800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850f1800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea991e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850c1f8c r4:850c1c00
 r7:ddde2d80 r6:83018200 r5:850c1f8c r4:84fb1c00
 r10:00000000 r9:84fb1c00 r8:80287e08 r7:e895de60 r6:84f89000 r5:850f1800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b56e8000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:217   state:D stack:0     pid:4007  tgid:4007  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ea9a1d84 r8:00000002 r7:60000113 r6:ea9a1d8c r5:850f3000
 r4:850f3000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850f3000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f98e80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea99b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850c278c r4:850c2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850c278c r4:84fb1d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850f3000 r8:84fb1d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fb1d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fb1d00 r8:80287e08 r7:e895de60 r6:84f89080 r5:850f3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9a1fb0 to 0xea9a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b59db000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r4:00000000
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:218:4009 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:218   state:D stack:0     pid:4009  tgid:4009  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ea9add84 r8:00000002 r7:60000113 r6:ea9add8c r5:850f2400
 r4:850f2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850f2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9ade08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f82000
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0e7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea9bf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850c2f8c r4:850c2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850c2f8c r4:84fb1e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850f2400 r8:84fb1e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fb1e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fb1e00 r8:80287e08 r7:ea9a1e60 r6:84f89100 r5:850f2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9adfb0 to 0xea9adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f98ec0
INFO: task kworker/1:218:4009 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b59db000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:219:4010 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:219   state:D stack:0     pid:4010  tgid:4010  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ea9b5d84 r8:00000002 r7:60000113 r6:ea9b5d8c r5:850f4800
 r4:850f4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850f4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f98980
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000
 r5:850c2b8c r4:850c2800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850c2b8c r4:84fb1e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850f4800 r8:84fb1eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fb1e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fb1e80 r8:80287e08 r7:ea9ade60 r6:84f89180 r5:850f4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9b5fb0 to 0xea9b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f98400
INFO: task kworker/1:219:4010 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b5f28000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
 r5:84e5378c r4:84e53400
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
INFO: task kworker/1:220:4012 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:220   state:D stack:0     pid:4012  tgid:4012  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ea9bdd84 r8:00000002 r7:60000013 r6:ea9bdd8c r5:850f3c00
 r4:850f3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850f3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9bde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f82680
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfaad000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850c838c r4:850c8000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850c838c r4:84fb1d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850f3c00 r8:84fb1dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fb1d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fb1d80 r8:80287e08 r7:ea9ade60 r6:84f89200 r5:850f3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9bdfb0 to 0xea9bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f98ec0
INFO: task kworker/1:220:4012 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b620b000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:221:4015 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:221   state:D stack:0     pid:4015  tgid:4015  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ea9cdd84 r8:00000002 r7:60000013 r6:ea9cdd8c r5:850f6c00
 r4:850f6c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850f6c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9cde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f821c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea9c5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850c338c r4:850c3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850c338c r4:84fb1f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850f6c00 r8:84fb1fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fb1f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fb1f80 r8:80287e08 r7:ea9bde60 r6:84f89280 r5:850f6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9cdfb0 to 0xea9cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:82ac21e4
 r4:dffe1dc0
 r5:00001000 r4:dfeb3000
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
INFO: task kworker/1:222:4016 blocked for more than 456 seconds.
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:222   state:D stack:0     pid:4016  tgid:4016  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ea9d1d84 r8:00000002 r7:60000013 r6:ea9d1d8c r5:850f5400
 r4:850f5400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850f5400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f82500
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9df000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850c3b8c r4:850c3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850c3b8c r4:84fb1f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850f5400 r8:84fb1f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fb1f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fb1f00 r8:80287e08 r7:ea9bde60 r6:84f89300 r5:850f5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9d1fb0 to 0xea9d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f822c0
INFO: task kworker/1:222:4016 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b6415000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:00001000 r4:dfa61000
 r5:850c3f8c r4:850c3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:850f0000 r8:84e7f0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f825c0
INFO: task kworker/1:223:4020 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b65f3000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:84d87ac0
      Not tainted 6.15.0-rc6-syzkaller #0
 r10:8291a684 r9:ea985d84 r8:00000002 r7:60000013 r6:ea985d8c r5:85089800
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea985e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f82f00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85089800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e001f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850c8f8c r4:850c8c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850c8f8c r4:84e7f100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85089800 r8:84e7f12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e7f100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e7f100 r8:80287e08 r7:ea9bde60 r6:84e7f180 r5:85089800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea985fb0 to 0xea985ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f825c0
INFO: task kworker/1:224:4022 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b69d7000 eca77000 00000001 80239b98 7f035000 00000001
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f82ac0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8508c800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd31000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850c878c r4:850c8400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:850c878c r4:84f89400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8508c800 r8:84f8942c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84f89400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f89400 r8:80287e08 r7:e8945e60 r6:84e7f000 r5:8508c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9e1fb0 to 0xea9e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e0d440
INFO: task kworker/0:230:4025 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b69d7000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:231:4026 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:231   state:D stack:0     pid:4026  tgid:4026  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ea9e9d84 r8:00000002 r7:60000113 r6:ea9e9d8c r5:85090000
 r4:85090000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85090000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:00001000 r4:e48ad000
 r5:847d7b8c r4:847d7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:84f89500
9fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b6c5f000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
INFO: task kworker/1:225:4027 blocked for more than 456 seconds.
 r4:850f6000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:850c8b8c r4:850c8800
 r7:ddde2d80 r6:83018200 r5:850c8b8c r4:84e7f200
 r10:00000000 r9:84e7f200 r8:80287e08 r7:ea985e60 r6:84f89580 r5:850f6000
Exception stack(0xea9b9fb0 to 0xea9b9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f82c40
INFO: task kworker/1:225:4027 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b72e2000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:232:4028 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:232   state:D stack:0     pid:4028  tgid:4028  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r4:84c68000
 r4:00000000
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:00001000 r4:dfeb5000
 r5:8511278c r4:85112400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:84c68000 r8:84f894ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84f89480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f89480 r8:80287e08 r7:ea9e9e60 r6:84f89600 r5:84c68000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9d5fb0 to 0xea9d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e0d5c0
INFO: task kworker/0:232:4028 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b7962000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ea9f5d84 r8:00000002 r7:60000113 r6:ea9f5d8c r5:84c6a400
 r4:84c6a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84c6a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f82c00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84c6a400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0039000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850c938c r4:850c9000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850c938c r4:84e7f280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84c6a400 r8:84e7f2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e7f280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e7f280 r8:80287e08 r7:ea985e60 r6:84f89680 r5:84c6a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9f5fb0 to 0xea9f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f82f40
INFO: task kworker/1:226:4034 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b7962000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:227:4035 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:227   state:D stack:0     pid:4035  tgid:4035  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ea9f9d84 r8:00000002 r7:60000013 r6:ea9f9d8c r5:84c68c00
 r4:84c68c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84c68c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f82240
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84c68c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0051000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850c978c r4:850c9400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850c978c r4:84e7f300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84c68c00 r8:84e7f32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e7f300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e7f300 r8:80287e08 r7:ea9f5e60 r6:84f89800 r5:84c68c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9f9fb0 to 0xea9f9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f82980
INFO: task kworker/1:227:4035 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b7dc8000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:84e5378c r4:84e53400
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:228   state:D stack:0     pid:4037  tgid:4037  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f82300
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84c6bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0471000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850c9f8c r4:850c9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850c9f8c r4:84e7f500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84c6bc00 r8:84e7f52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e7f500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e7f500 r8:80287e08 r7:ea9f9e60 r6:84f89700 r5:84c6bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa01fb0 to 0xeaa01ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84fa12c0
INFO: task kworker/1:228:4037 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b7dc8000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:229   state:D stack:0     pid:4038  tgid:4038  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ea9f1d84 r8:00000002 r7:60000013 r6:ea9f1d8c r5:85092400
 r4:85092400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85092400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa15c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0463000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850c9b8c r4:850c9800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850c9b8c r4:84e7f580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85092400 r8:84e7f5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e7f580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e7f580 r8:80287e08 r7:eaa01e60 r6:84e7f400 r5:85092400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9f1fb0 to 0xea9f1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84fa12c0
INFO: task kworker/1:229:4038 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d20:                   b84ba000 eca77000 00000001 80239b98 7f035000 00000001
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:230:4041 blocked for more than 456 seconds.
 r4:85093000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850ca78c r4:850ca400
 r7:ddde2d80 r6:83018200 r5:850ca78c r4:84e7f480
 r10:00000000 r9:84e7f480 r8:80287e08 r7:eaa01e60 r6:84e7f680 r5:85093000
 r4:84e75080
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b84ba000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:231:4042 blocked for more than 456 seconds.
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ea9e5d84 r8:00000002 r7:60000013 r6:ea9e5d8c r5:85093c00
 r4:85093c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85093c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e75040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85093c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e048f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850ca38c r4:850ca000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850ca38c r4:84e7f700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85093c00 r8:84e7f72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e7f700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e7f700 r8:80287e08 r7:ea9fde60 r6:84e7f600 r5:85093c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9e5fb0 to 0xea9e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e75080
INFO: task kworker/1:231:4042 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b8ad3000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:233:4044 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:233   state:D stack:0     pid:4044  tgid:4044  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaa15d84 r8:00000002 r7:60000113 r6:eaa15d8c r5:85095400
 r4:85095400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85095400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa15e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0de40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85095400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:85112b8c r4:85112800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:84f89780 r8:80287e08 r7:ea9e9e60 r6:84e7f800 r5:85095400
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:232:4046 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:232   state:D stack:0     pid:4046  tgid:4046  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaa1dd84 r8:00000002 r7:60000013 r6:eaa1dd8c r5:85094800
 r4:85094800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85094800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa1de08
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r5:850cab8c r4:850ca800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:85094800 r8:84e7f7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:82ac21e4
 r4:dffe1dc0
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:233:4047 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:233   state:D stack:0     pid:4047  tgid:4047  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaa21d84 r8:00000002 r7:60000113 r6:eaa21d8c r5:85091800
 r4:85091800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85091800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa21e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e75dc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85091800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0529000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850cb78c r4:850cb400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850cb78c r4:84e7fa00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85091800 r8:84e7fa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e7fa00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e7fa00 r8:80287e08 r7:eaa1de60 r6:84e7f880 r5:85091800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa21fb0 to 0xeaa21ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e75080
INFO: task kworker/1:233:4047 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b908c000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:234:4049 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:234   state:D stack:0     pid:4049  tgid:4049  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaa31d84 r8:00000002 r7:60000013 r6:eaa31d8c r5:85090c00
 r4:85090c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85090c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa31e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e75780
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85090c00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e04d3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850caf8c r4:850cac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850caf8c r4:84e7f900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85090c00 r8:84e7f92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e7f900
 r10:00000000 r9:84e7f900 r8:80287e08 r7:eaa21e60 r6:84e7fb80 r5:85090c00
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r4:dffe1dc0
 r4:00000000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:235:4051 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:235   state:D stack:0     pid:4051  tgid:4051  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaa35d84 r8:00000002 r7:60000013 r6:eaa35d8c r5:85096c00
 r4:85096c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85096c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa35e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e75d00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85096c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0511000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850cb38c r4:850cb000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850cb38c r4:84e7fa80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85096c00 r8:84e7faac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e7fa80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e7fa80 r8:80287e08 r7:eaa21e60 r6:84e7fb00 r5:85096c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa35fb0 to 0xeaa35ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e75480
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b99ad000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:234:4053 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:234   state:D stack:0     pid:4053  tgid:4053  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r10:8291a684 r9:eaa3dd84 r8:00000002 r7:60000113 r6:eaa3dd8c r5:84c46c00
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa3de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0dec0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84c46c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e04fd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85112f8c r4:85112c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85112f8c r4:84f89880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84c46c00 r8:84f898ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84f89880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f89880 r8:80287e08 r7:ea9e9e60 r6:84e7fc00 r5:84c46c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa3dfb0 to 0xeaa3dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e0dbc0
INFO: task kworker/0:234:4053 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b99ad000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r4:82ac21e4
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:84e5378c r4:84e53400
 r4:84e0be80
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:236   state:D stack:0     pid:4056  tgid:4056  ppid:2      task_flags:0x4208060 flags:0x00000000
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaa45d84 r8:00000002 r7:60000113 r6:eaa45d8c r5:8508a400
 r4:8508a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8508a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa45e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e75fc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8508a400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0541000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850cbb8c r4:850cb800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850cbb8c r4:84e7fc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8508a400 r8:84e7fcac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e7fc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e7fc80 r8:80287e08 r7:eaa21e60 r6:84e7fd80 r5:8508a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa45fb0 to 0xeaa45ff8)
5fa0:                                     00000000 00000000 00000000 00000000
 r4:84e75e00
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:00001000 r4:dfeb3000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:237:4059 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:237   state:D stack:0     pid:4059  tgid:4059  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaa41d84 r8:00000002 r7:60000113 r6:eaa41d8c r5:85098000
 r4:85098000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85098000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa41e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0a040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85098000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e055b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850cbf8c r4:850cbc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850cbf8c r4:84e7fe00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85098000 r8:84e7fe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e7fe00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e7fe00 r8:80287e08 r7:eaa45e60 r6:84e7ff00 r5:85098000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa41fb0 to 0xeaa41ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e75f80
INFO: task kworker/1:237:4059 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ba151000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:238:4061 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:238   state:D stack:0     pid:4061  tgid:4061  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaa11d84 r8:00000002 r7:60000113 r6:eaa11d8c r5:85098c00
 r4:85098c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85098c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa11e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0a140
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85098c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0589000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850d438c r4:850d4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850d438c r4:84e7fd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85098c00 r8:84e7fd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e7fd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e7fd00 r8:80287e08 r7:eaa41e60 r6:84e7fe80 r5:85098c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa11fb0 to 0xeaa11ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r4:dffe1dc0
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:239:4064 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:239   state:D stack:0     pid:4064  tgid:4064  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaa39d84 r8:00000002 r7:60000113 r6:eaa39d8c r5:85099800
 r4:85099800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85099800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa39e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0a4c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85099800 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e05d3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850d4b8c r4:850d4800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850d4b8c r4:84e10000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85099800 r8:84e1002c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e10000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e10000 r8:80287e08 r7:eaa11e60 r6:84e10180 r5:85099800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa39fb0 to 0xeaa39ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e0a100
INFO: task kworker/1:239:4064 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ba73a000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
 r4:8509a400
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
 r5:00001000 r4:e059d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850d478c r4:850d4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850d478c r4:84e10080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8509a400 r8:84e100ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e10080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e10080 r8:80287e08 r7:eaa39e60 r6:84e10100 r5:8509a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa49fb0 to 0xeaa49ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e0a200
INFO: task kworker/1:240:4065 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   bb09c000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:235:4067 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:235   state:D stack:0     pid:4067  tgid:4067  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaa4dd84 r8:00000002 r7:60000113 r6:eaa4dd8c r5:8509b000
 r4:8509b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8509b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa4de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e016c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8509b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e071b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8511338c r4:85113000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8511338c r4:84f89980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8509b000 r8:84f899ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84f89980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f89980 r8:80287e08 r7:ea9e9e60 r6:84e10200 r5:8509b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa4dfb0 to 0xeaa4dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e0d1c0
INFO: task kworker/0:235:4067 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   bb09c000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:241:4069 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:241   state:D stack:0     pid:4069  tgid:4069  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaa51d84 r8:00000002 r7:60000013 r6:eaa51d8c r5:8509bc00
 r4:8509bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8509bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa51e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0a8c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8509bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850d538c r4:850d5000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:84e10300 r8:80287e08 r7:eaa39e60 r6:84e10380 r5:8509bc00
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
1d20:                   bb7ad000 eca77000 00000001 80239b98 7f035000 00000001
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:242:4070 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:242   state:D stack:0     pid:4070  tgid:4070  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaa59d84 r8:00000002 r7:60000113 r6:eaa59d8c r5:8509c800
 r4:8509c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8509c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0a600
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850d4f8c r4:850d4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850d4f8c r4:84e10280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8509c800 r8:84e102ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e10280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e10280 r8:80287e08 r7:eaa51e60 r6:84e10400 r5:8509c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa59fb0 to 0xeaa59ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e0a480
INFO: task kworker/1:242:4070 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   bbd90000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:243:4072 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:243   state:D stack:0     pid:4072  tgid:4072  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaa55d84 r8:00000002 r7:60000113 r6:eaa55d8c r5:8509d400
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa55e08
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0a9c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8509d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0619000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850d578c r4:850d5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850d578c r4:84e10480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8509d400 r8:84e104ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e10480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e10480 r8:80287e08 r7:eaa51e60 r6:84e10580 r5:8509d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa55fb0 to 0xeaa55ff8)
5fa0:                                     00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   bbd90000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:244:4074 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:244   state:D stack:0     pid:4074  tgid:4074  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaa61d84 r8:00000002 r7:60000113 r6:eaa61d8c r5:8509e000
 r4:8509e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8509e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa61e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0ad40
 r5:00001000 r4:e0665000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:245:4076 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:245   state:D stack:0     pid:4076  tgid:4076  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaa65d84 r8:00000002 r7:60000113 r6:eaa65d8c r5:8509ec00
 r4:8509ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8509ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa65e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0ab80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8509ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e062d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850d5b8c r4:850d5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850d5b8c r4:84e10680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8509ec00 r8:84e106ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e10680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e10680 r8:80287e08 r7:eaa61e60 r6:84e10800 r5:8509ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa65fb0 to 0xeaa65ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e0ac80
INFO: task kworker/1:245:4076 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   bc6bf000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:246:4078 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:246   state:D stack:0     pid:4078  tgid:4078  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaa69d84 r8:00000002 r7:60000013 r6:eaa69d8c r5:85150000
 r4:85150000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85150000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa69e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0adc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85150000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0685000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850d638c r4:850d6000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850d638c r4:84e10700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85150000 r8:84e1072c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e10700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e10700 r8:80287e08 r7:eaa61e60 r6:84e10880 r5:85150000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa69fb0 to 0xeaa69ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e0ad00
INFO: task kworker/1:246:4078 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   bc97b000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:247:4080 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:247   state:D stack:0     pid:4080  tgid:4080  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaa6dd84 r8:00000002 r7:60000113 r6:eaa6dd8c r5:85150c00
 r4:85150c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85150c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa6de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0d200
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85150c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06ff000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850d678c r4:850d6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850d678c r4:84e10900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85150c00 r8:84e1092c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e10900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e10900 r8:80287e08 r7:eaa69e60 r6:84e10a00 r5:85150c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa6dfb0 to 0xeaa6dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e0d100
INFO: task kworker/1:247:4080 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   bc97b000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:248:4082 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:248   state:D stack:0     pid:4082  tgid:4082  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaa71d84 r8:00000002 r7:60000013 r6:eaa71d8c r5:85151800
 r4:85151800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85151800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa71e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84589040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85151800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e070d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850d6b8c r4:850d6800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850d6b8c r4:84e10780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85151800 r8:84e107ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e10780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e10780 r8:80287e08 r7:eaa6de60 r6:84e10b00 r5:85151800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa71fb0 to 0xeaa71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84589080
INFO: task kworker/1:248:4082 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   bcfcd000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:249:4084 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:249   state:D stack:0     pid:4084  tgid:4084  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaa75d84 r8:00000002 r7:60000113 r6:eaa75d8c r5:85152400
 r4:85152400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85152400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa75e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84589340
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85152400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e075d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850d6f8c r4:850d6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850d6f8c r4:84e10980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85152400 r8:84e109ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e10980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e10980 r8:80287e08 r7:eaa71e60 r6:84e10a80 r5:85152400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa75fb0 to 0xeaa75ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84589080
INFO: task kworker/1:249:4084 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   bd631000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:250:4087 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:250   state:D stack:0     pid:4087  tgid:4087  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaa79d84 r8:00000002 r7:60000013 r6:eaa79d8c r5:84c6c800
 r4:84c6c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84c6c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa79e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84589700
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84c6c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e080b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850d7b8c r4:850d7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850d7b8c r4:84e10b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84c6c800 r8:84e10bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e10b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e10b80 r8:80287e08 r7:eaa75e60 r6:84f89a00 r5:84c6c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa79fb0 to 0xeaa79ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84589300
INFO: task kworker/1:250:4087 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   bd631000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:251:4089 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:251   state:D stack:0     pid:4089  tgid:4089  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaa81d84 r8:00000002 r7:60000013 r6:eaa81d8c r5:84c6d400
 r4:84c6d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84c6d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa81e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84589480
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84c6d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e07b1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850d738c r4:850d7000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850d738c r4:84e10d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84c6d400 r8:84e10d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e10d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e10d00 r8:80287e08 r7:eaa79e60 r6:84f89b00 r5:84c6d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa81fb0 to 0xeaa81ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845893c0
INFO: task kworker/1:251:4089 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:252:4090 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:252   state:D stack:0     pid:4090  tgid:4090  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaa85d84 r8:00000002 r7:60000113 r6:eaa85d8c r5:84c6ec00
 r4:84c6ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84c6ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa85e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845895c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84c6ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e07d3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850d778c r4:850d7400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace: 
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   bdb1e000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
      Not tainted 6.15.0-rc6-syzkaller #0
 r4:00000000
 r5:00001000 r4:dfc81000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:84f89a80
Exception stack(0xeaa89fb0 to 0xeaa89ff8)
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:800f0013 r4:80239bb0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
      Not tainted 6.15.0-rc6-syzkaller #0
 r10:8291a684 r9:eaa7dd84 r8:00000002 r7:60000113 r6:eaa7dd8c r5:85153000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa7de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84589780
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85153000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e081f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850d7f8c r4:850d7c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:850d7f8c r4:84e10e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85153000 r8:84e10e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e10e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e10e00 r8:80287e08 r7:eaa79e60 r6:84e10c00 r5:85153000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa7dfb0 to 0xeaa7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84589a00
INFO: task kworker/1:253:4095 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   be879000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
 r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8518c38c r4:8518c000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85154800 r8:84e10cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e10c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e10c80 r8:80287e08 r7:eaa7de60 r6:84e10e80 r5:85154800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa8dfb0 to 0xeaa8dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845897c0
INFO: task kworker/1:254:4096 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   bed40000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:84e0be80
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/1:255:4098 blocked for more than 457 seconds.
 r4:85155400
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa91e08
 r4:00000000
 r5:00001000 r4:e0841000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xeaa91fb0 to 0xeaa91ff8)
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:800f0013 r4:80239bb0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace: 
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84568000 r8:80287e08 r7:eaa91e60 r6:84568180 r5:85156000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84589b00
INFO: task kworker/1:256:4101 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   bfa88000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:257:4102 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:257   state:D stack:0     pid:4102  tgid:4102  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaa9dd84 r8:00000002 r7:60000013 r6:eaa9dd8c r5:85156c00
 r4:85156c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85156c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa9de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84589e00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85156c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e4881000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8518cf8c r4:8518cc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8518cf8c r4:84568080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85156c00 r8:845680ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84568080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84568080 r8:80287e08 r7:eaa95e60 r6:84568280 r5:85156c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa9dfb0 to 0xeaa9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84589bc0
INFO: task kworker/1:257:4102 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c016a000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84568100 r8:80287e08 r7:eaa9de60 r6:84568200 r5:85158000
 r4:84589dc0
Workqueue: events bpf_prog_free_deferred
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:259:4105 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:259   state:D stack:0     pid:4105  tgid:4105  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaaa5d84 r8:00000002 r7:60000013 r6:eaaa5d8c r5:85158c00
 r4:85158c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85158c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3c140
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85158c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9bc000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8518d38c r4:8518d000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8518d38c r4:84568300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85158c00 r8:8456832c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84568300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84568300 r8:80287e08 r7:eaaa1e60 r6:84568380 r5:85158c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaaa5fb0 to 0xeaaa5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84589dc0
INFO: task kworker/1:259:4105 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c0c6a000 eca77000 00000001 80239b98 7f035000 00000001
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
task:kworker/1:260   state:D stack:0     pid:4108  tgid:4108  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3c440
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:8515a400 r8:8456842c r7:82804d40 r6:ddde2d80 r5:ddde2da0
Exception stack(0xe48a9fb0 to 0xe48a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f3c200
INFO: task kworker/1:260:4108 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c11ee000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:261:4111 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:261   state:D stack:0     pid:4111  tgid:4111  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e8905d84 r8:00000002 r7:60000013 r6:e8905d8c r5:8515bc00
 r4:8515bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8515bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8905e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3c700
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8515bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd95000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8518df8c r4:8518dc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8518df8c r4:84568580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8515bc00 r8:845685ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f3c400
INFO: task kworker/1:261:4111 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c11ee000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84e0be80
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace: 
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
1d20:                   c186a000 eca77000 00000001 80239b98 7f035000 00000001
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ea995d84 r8:00000002 r7:60000113 r6:ea995d8c r5:8515d400
 r4:8515d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8515d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea995e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3c940
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8515d400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe71000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8518e78c r4:8518e400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8518e78c r4:84568600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8515d400 r8:8456862c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84568600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84568600 r8:80287e08 r7:e8929e60 r6:84568880 r5:8515d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea995fb0 to 0xea995ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f3c940
INFO: task kworker/1:263:4116 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c1ba2000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:237:4117 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:237   state:D stack:0     pid:4117  tgid:4117  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84c69800 r8:84f89c2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84f89c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f89c00 r8:80287e08 r7:ea9e9e60 r6:84f89d00 r5:84c69800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa99fb0 to 0xeaa99ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
      Not tainted 6.15.0-rc6-syzkaller #0
 r10:8291a684 r9:eaaadd84 r8:00000002 r7:60000113 r6:eaaadd8c r5:84c6b000
 r4:84c6b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84c6b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/1:265:4121 blocked for more than 457 seconds.
 r10:8291a684 r9:eaaa9d84 r8:00000002 r7:60000113 r6:eaaa9d8c r5:85096000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3ccc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85096000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff1d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8518eb8c r4:8518e800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8518eb8c r4:84568980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85096000 r8:845689ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84568980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84568980 r8:80287e08 r7:eaaade60 r6:84f89e80 r5:85096000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaaa9fb0 to 0xeaaa9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f3cd80
INFO: task kworker/1:265:4121 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
1d20:                   c289e000 eca77000 00000001 80239b98 7f035000 00000001
 r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:266:4124 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:266   state:D stack:0     pid:4124  tgid:4124  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3cf40
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r7:ddde2d80 r6:83018200 r5:8518f38c r4:84568a00
 r10:00000000 r9:84568a00 r8:80287e08 r7:eaaade60 r6:84f89c80 r5:84f10000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace: 
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:267:4126 blocked for more than 457 seconds.
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e01140
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:84568a80
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:268:4127 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:268   state:D stack:0     pid:4127  tgid:4127  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaac5d84 r8:00000002 r7:60000113 r6:eaac5d8c r5:84f12400
 r4:84f12400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f12400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84301040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f12400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e00db000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8518fb8c r4:8518f800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8518fb8c r4:84568b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f12400 r8:84568b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84568b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:269:4129 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:269   state:D stack:0     pid:4129  tgid:4129  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Exception stack(0xeaacdfb0 to 0xeaacdff8)
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3bd80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84f13c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e8901000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8513038c r4:85130000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8513038c r4:84fb1300
 r10:61c88647 r9:84f13c00 r8:84fb132c r7:82804d40 r6:dddced80 r5:dddceda0
Workqueue: events bpf_prog_free_deferred
 r4:82ac21e4
 r5:00001000 r4:dfeb3000
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r10:8291a684 r9:eaad9d84 r8:00000002 r7:60000113 r6:eaad9d8c r5:84f13000
 r5:00001000 r4:e00f9000
 r10:61c88647 r9:84f13000 r8:8456882c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r10:8291a684 r9:eaaddd84 r8:00000002 r7:60000013 r6:eaaddd8c r5:84f15400
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaadde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843012c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f15400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e010b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8519438c r4:85194000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8519438c r4:84568c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:84301240
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r4:84e0be80
INFO: task kworker/1:272:4137 blocked for more than 458 seconds.
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:00000000 r9:84568c80 r8:80287e08 r7:eaacde60 r6:84def100 r5:84f16c00
 r5:800f0013 r4:80239bb0
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:273:4139 blocked for more than 458 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:273   state:D stack:0     pid:4139  tgid:4139  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaaf1d84 r8:00000002 r7:60000113 r6:eaaf1d8c r5:84f14800
 r4:84f14800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Workqueue: events bpf_prog_free_deferred
 r4:dffe1dc0
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
      Not tainted 6.15.0-rc6-syzkaller #0
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84568e00 r8:80287e08 r7:eaaf1e60 r6:84def200 r5:84f16000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaaf5fb0 to 0xeaaf5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84301700
INFO: task kworker/1:274:4141 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c5970000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
1fa0:                                     00000000 00000000 00000000 00000000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Workqueue: events bpf_prog_free_deferred
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r10:8291a684 r9:eaab1d84 r8:00000002 r7:60000013 r6:eaab1d8c r5:8515e000
 r5:00001000 r4:dfde3000
 r4:84568f00
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c61c7000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84def300 r8:80287e08 r7:eaad1e60 r6:84568900 r5:85159800
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Workqueue: events bpf_prog_free_deferred
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:8291a684 r9:eab11d84 r8:00000002 r7:60000113 r6:eab11d8c r5:8515b000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:8515b000 r8:84def42c r7:82804d40 r6:dddced80 r5:dddceda0
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f3bdc0
INFO: task kworker/0:241:4150 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c6c7c000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:84e0be80
 r4:84d87ac0
 r4:85160000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3b4c0
 r7:dddced80 r6:83018000 r5:85130b8c r4:84def500
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:82ac21e4
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:243:4157 blocked for more than 458 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:243   state:D stack:0     pid:4157  tgid:4157  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eab29d84 r8:00000002 r7:60000113 r6:eab29d8c r5:85161800
 r4:85161800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85161800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab29e08
 r4:00000000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:84f3b600
1d20:                   c787c000 eca77000 00000001 80239b98 7f035000 00000001
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
Workqueue: events bpf_prog_free_deferred
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:61c88647 r9:85160c00 r8:84def5ac r7:82804d40 r6:dddced80 r5:dddceda0
Call trace: 
 r4:82ac21e4
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
task:kworker/0:245   state:D stack:0     pid:4160  tgid:4160  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845921c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85163c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfed1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8513178c r4:85131400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8513178c r4:84def700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85163c00 r8:84def72c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84def700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84def700 r8:80287e08 r7:eab31e60 r6:84ded100 r5:85163c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab35fb0 to 0xeab35ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84592080
INFO: task kworker/0:245:4160 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c82b2000 eca77000 00000001 80239b98 7f035000 00000001
 r4:82ac21e4
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:84d87ac0
 r10:8291a684 r9:e8911d84 r8:00000002 r7:60000113 r6:e8911d8c r5:85100c00
 r5:00001000 r4:e0017000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Call trace: 
 r4:82ac21e4
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:247:4165 blocked for more than 458 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:247   state:D stack:0     pid:4165  tgid:4165  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eab39d84 r8:00000002 r7:60000113 r6:eab39d8c r5:85101800
 r4:85101800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85101800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab39e08
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8513238c r4:85132000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8513238c r4:84def680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85101800 r8:84def6ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84def680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84def680 r8:80287e08 r7:eab31e60 r6:84def900 r5:85101800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Workqueue: events bpf_prog_free_deferred
 r4:82ac21e4
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
Workqueue: events bpf_prog_free_deferred
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
 r4:00000001
      Not tainted 6.15.0-rc6-syzkaller #0
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Workqueue: events bpf_prog_free_deferred
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
 r10:8291a684 r9:eaae9d84 r8:00000002 r7:60000013 r6:eaae9d8c r5:85103c00
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84defa80 r8:80287e08 r7:eab41e60 r6:84defb00 r5:85103c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaae9fb0 to 0xeaae9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845928c0
INFO: task kworker/0:250:4170 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c9eb3000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r5:84e5378c r4:84e53400
1fa0:                                     00000000 00000000 00000000 00000000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab49e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Workqueue: events bpf_prog_free_deferred
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85106000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e05ab000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85195f8c r4:85195c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85195f8c r4:84ded200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85106000 r8:84ded22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84ded200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84ded200 r8:80287e08 r7:eaaf9e60 r6:84defd00 r5:85106000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab4dfb0 to 0xeab4dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8458c640
INFO: task kworker/1:277:4175 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:800f0013 r4:80239bb0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Workqueue: events bpf_prog_free_deferred
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ca8fa000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
Workqueue: events bpf_prog_free_deferred
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:00001000 r4:dfeb3000
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:254:4179 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:254   state:D stack:0     pid:4179  tgid:4179  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eab5dd84 r8:00000002 r7:60000113 r6:eab5dd8c r5:85108c00
 r4:85108c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85108c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84deff00 r8:80287e08 r7:eab41e60 r6:84deff80 r5:85108c00
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab51e08
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
INFO: task kworker/0:256:4184 blocked for more than 459 seconds.
 r4:8510a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8510a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab65e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df1240
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8510a400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e05eb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8513c38c r4:8513c000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8513c38c r4:84e07180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8510a400 r8:84e071ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e07180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e07180 r8:80287e08 r7:eab51e60 r6:84e07280 r5:8510a400
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
      Not tainted 6.15.0-rc6-syzkaller #0
 r4:00000000
 r5:00001000 r4:e0629000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:82ac21e4
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
      Not tainted 6.15.0-rc6-syzkaller #0
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab6de08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8513c78c r4:8513c400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8513c78c r4:84e07200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8510bc00 r8:84e0722c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e07200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e07200 r8:80287e08 r7:eab69e60 r6:84e07480 r5:8510bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab6dfb0 to 0xeab6dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84df1380
INFO: task kworker/0:258:4189 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cbd20000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r10:61c88647 r9:8510c800 r8:84e0732c r7:82804d40 r6:dddced80 r5:dddceda0
Call trace: 
 r4:82ac21e4
 r5:84e5378c r4:84e53400
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r7:dddced80 r6:83018000 r5:8513cf8c r4:84e07580
 r10:61c88647 r9:8510e000 r8:84e075ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e07580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e07580 r8:80287e08 r7:eab71e60 r6:84e07400 r5:8510e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab61fb0 to 0xeab61ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84df1600
INFO: task kworker/0:260:4193 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cbd20000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
1fa0:                                     00000000 00000000 00000000 00000000
 r4:8510ec00
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:82ac21e4
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r5:8510d400 r4:8291a680
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df1a80
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cc347000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
      Not tainted 6.15.0-rc6-syzkaller #0
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
Call trace: 
1d60: 80230ad0 80239bb0 800f0013 ffffffff
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab85e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:84e07700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e07700 r8:80287e08 r7:eab71e60 r6:84e07900 r5:84f20c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab85fb0 to 0xeab85ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84df19c0
INFO: task kworker/0:263:4199 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cc673000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r5:00001000 r4:e080d000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1d60: 80230ad0 80239bb0 800f0013 ffffffff
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:280:4205 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:280   state:D stack:0     pid:4205  tgid:4205  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eab99d84 r8:00000002 r7:60000013 r6:eab99d8c r5:84f23c00
 r4:84f23c00
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r5:800f0013 r4:80239bb0
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:84d87ac0
 r5:84f21800 r4:8291a680
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:84ded500 r8:80287e08 r7:eab99e60 r6:84e07a00 r5:84f21800
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:84f24800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f24800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab95e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f844c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84f24800 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e087d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8513e78c r4:8513e400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8513e78c r4:84e07a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f24800 r8:84e07aac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e07a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e07a80 r8:80287e08 r7:eab71e60 r6:84e07b80 r5:84f24800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab95fb0 to 0xeab95ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Workqueue: events bpf_prog_free_deferred
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f84a40
 r10:61c88647 r9:84f25400 r8:84e07c2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e07c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e07c00 r8:80287e08 r7:eab95e60 r6:84e07d00 r5:84f25400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaba1fb0 to 0xeaba1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f845c0
INFO: task kworker/0:265:4210 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cdf1e000 eca77000 00000001 80239b98 7f035000 00000001
 r5:800f0013 r4:80239bb0
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
task:kworker/1:282   state:D stack:0     pid:4212  tgid:4212  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eab81d84 r8:00000002 r7:60000013 r6:eab81d8c r5:84f26000
 r4:84f26000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f26000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab81e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f91480
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f26000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
 r5:00001000 r4:dfe57000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84ded480 r8:80287e08 r7:eab99e60 r6:84e07d80 r5:84f26000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace: 
1d20:                   ce3ca000 eca77000 00000001 80239b98 7f035000 00000001
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r5:84e5378c r4:84e53400
 r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:266:4213 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:266   state:D stack:0     pid:4213  tgid:4213  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaba5d84 r8:00000002 r7:60000113 r6:eaba5d8c r5:84f26c00
 r4:84f26c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f26c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f84800
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84f26c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e4895000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8513eb8c r4:8513e800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:84f26c00 r8:84e07cac r7:82804d40 r6:dddced80 r5:dddceda0
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ce3ca000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
      Not tainted 6.15.0-rc6-syzkaller #0
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eab89d84 r8:00000002 r7:60000113 r6:eab89d8c r5:84f22400
 r4:84f22400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f22400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab89e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f84880
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:84f99000 r8:80287e08 r7:eaba1e60 r6:84f99100 r5:84f22400
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f84b40
INFO: task kworker/0:267:4216 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cea2a000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:268:4218 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:268   state:D stack:0     pid:4218  tgid:4218  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eabadd84 r8:00000002 r7:60000113 r6:eabadd8c r5:851d0000
 r4:851d0000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:851d0000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabade08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f84bc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:851d0000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e895f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8513f78c r4:8513f400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8513f78c r4:84f99180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:851d0000 r8:84f991ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84f99180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f99180 r8:80287e08 r7:eaba1e60 r6:84f99280 r5:851d0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabadfb0 to 0xeabadff8)
dfa0:                                     00000000 00000000 00000000 00000000
 r4:84f84980
Call trace: 
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:269:4220 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:269   state:D stack:0     pid:4220  tgid:4220  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eabb1d84 r8:00000002 r7:60000113 r6:eabb1d8c r5:851d0c00
 r4:851d0c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:851d0c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f84d80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:851d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9db000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cf433000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:270:4225 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:270   state:D stack:0     pid:4225  tgid:4225  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eabb5d84 r8:00000002 r7:60000113 r6:eabb5d8c r5:851d1800
 r4:851d1800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:851d1800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f84ec0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:851d1800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfba9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8513ff8c r4:8513fc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8513ff8c r4:84f99300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:851d1800 r8:84f9932c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84f99300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f99300 r8:80287e08 r7:eabb1e60 r6:84f99380 r5:851d1800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabb5fb0 to 0xeabb5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f84fc0
INFO: task kworker/0:270:4225 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cf67a000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:271:4227 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:271   state:D stack:0     pid:4227  tgid:4227  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaba9d84 r8:00000002 r7:60000113 r6:eaba9d8c r5:851d2400
 r4:851d2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:851d2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8458c680
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:851d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc4f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8514838c r4:85148000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8514838c r4:84f99400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:851d2400 r8:84f9942c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84f99400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f99400 r8:80287e08 r7:eabb5e60 r6:84f99480 r5:851d2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaba9fb0 to 0xeaba9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f84fc0
INFO: task kworker/0:271:4227 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cf67a000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:272:4228 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:272   state:D stack:0     pid:4228  tgid:4228  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eabc5d84 r8:00000002 r7:60000113 r6:eabc5d8c r5:851d3000
 r4:851d3000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:851d3000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502f340
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:851d3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa0b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8514878c r4:85148400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8514878c r4:84f99500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:851d3000 r8:84f9952c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84f99500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f99500 r8:80287e08 r7:eaba9e60 r6:84f99580 r5:851d3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabc5fb0 to 0xeabc5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f84fc0
INFO: task kworker/0:272:4228 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d030b000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:273:4229 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:273   state:D stack:0     pid:4229  tgid:4229  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eabc9d84 r8:00000002 r7:60000113 r6:eabc9d8c r5:851d3c00
 r4:851d3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:851d3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502fb80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:851d3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea997000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a278c r4:851a2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851a278c r4:84f99600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:851d3c00 r8:84f9962c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84f99600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f99600 r8:80287e08 r7:eabc5e60 r6:84f99680 r5:851d3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabc9fb0 to 0xeabc9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84df1f40
INFO: task kworker/0:273:4229 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d030b000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:283:4230 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:283   state:D stack:0     pid:4230  tgid:4230  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eabcdd84 r8:00000002 r7:60000013 r6:eabcdd8c r5:851d4800
 r4:851d4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:851d4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabcde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f91500
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:851d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfefd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8519738c r4:85197000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8519738c r4:84ded300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:851d4800 r8:84ded32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84ded300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84ded300 r8:80287e08 r7:eab99e60 r6:84f99700 r5:851d4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabcdfb0 to 0xeabcdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f91680
INFO: task kworker/1:283:4230 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d095c000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:284:4233 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:284   state:D stack:0     pid:4233  tgid:4233  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eabd9d84 r8:00000002 r7:60000013 r6:eabd9d8c r5:851d5400
 r4:851d5400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:851d5400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f91600
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:851d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dffa5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8519778c r4:85197400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8519778c r4:84ded580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:851d5400 r8:84ded5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84ded580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84ded580 r8:80287e08 r7:eab99e60 r6:84f99780 r5:851d5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabd9fb0 to 0xeabd9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f91680
INFO: task kworker/1:284:4233 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d0d96000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:285:4235 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:285   state:D stack:0     pid:4235  tgid:4235  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eabe1d84 r8:00000002 r7:60000013 r6:eabe1d8c r5:84f18000
 r4:84f18000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f18000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f971c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f18000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e896f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a1f8c r4:851a1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a1f8c r4:84ded680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f18000 r8:84ded6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84ded680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84ded680 r8:80287e08 r7:eab99e60 r6:84f99800 r5:84f18000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabe1fb0 to 0xeabe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f91700
INFO: task kworker/1:285:4235 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d0d96000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:286:4236 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:286   state:D stack:0     pid:4236  tgid:4236  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eabe5d84 r8:00000002 r7:60000113 r6:eabe5d8c r5:84f18c00
 r4:84f18c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f18c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f91940
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f18c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e00b9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85197f8c r4:85197c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85197f8c r4:84ded700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f18c00 r8:84ded72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84ded700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84ded700 r8:80287e08 r7:eabe1e60 r6:84f99880 r5:84f18c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabe5fb0 to 0xeabe5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f91a40
INFO: task kworker/1:286:4236 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d0d96000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:287:4238 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:287   state:D stack:0     pid:4238  tgid:4238  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eabedd84 r8:00000002 r7:60000113 r6:eabedd8c r5:84f1a400
 r4:84f1a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f1a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabede08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f919c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f1a400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0101000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a038c r4:851a0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a038c r4:84ded880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f1a400 r8:84ded8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84ded880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84ded880 r8:80287e08 r7:eabe1e60 r6:84f99900 r5:84f1a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabedfb0 to 0xeabedff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f91b00
INFO: task kworker/1:287:4238 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d1396000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:288:4240 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:288   state:D stack:0     pid:4240  tgid:4240  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eabf5d84 r8:00000002 r7:60000113 r6:eabf5d8c r5:84f19800
 r4:84f19800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f19800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f91bc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f19800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0121000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a078c r4:851a0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a078c r4:84ded800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f19800 r8:84ded82c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84ded800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84ded800 r8:80287e08 r7:eabe1e60 r6:84f99980 r5:84f19800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabf5fb0 to 0xeabf5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f91a00
INFO: task kworker/1:288:4240 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d1c8e000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:289:4242 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:289   state:D stack:0     pid:4242  tgid:4242  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eabfdd84 r8:00000002 r7:60000113 r6:eabfdd8c r5:84f1c800
 r4:84f1c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f1c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabfde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f91d00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f1c800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e066b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a0b8c r4:851a0800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a0b8c r4:84ded900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f1c800 r8:84ded92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84ded900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84ded900 r8:80287e08 r7:eabe1e60 r6:84f99a00 r5:84f1c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabfdfb0 to 0xeabfdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f91b80
INFO: task kworker/1:289:4242 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d1c8e000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:290:4244 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:290   state:D stack:0     pid:4244  tgid:4244  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eac05d84 r8:00000002 r7:60000113 r6:eac05d8c r5:84f1bc00
 r4:84f1bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f1bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac05e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f91e40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f1bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e082f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a0f8c r4:851a0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a0f8c r4:84ded600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f1bc00 r8:84ded62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84ded600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84ded600 r8:80287e08 r7:eabe1e60 r6:84f99a80 r5:84f1bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac05fb0 to 0xeac05ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f91c40
INFO: task kworker/1:290:4244 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d2a08000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:291:4246 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:291   state:D stack:0     pid:4246  tgid:4246  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eac0dd84 r8:00000002 r7:60000013 r6:eac0dd8c r5:84f1b000
 r4:84f1b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f1b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac0de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f91f80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f1b000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e48db000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a138c r4:851a1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a138c r4:84ded980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f1b000 r8:84ded9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84ded980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84ded980 r8:80287e08 r7:eabe1e60 r6:84f99b00 r5:84f1b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac0dfb0 to 0xeac0dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f91d80
INFO: task kworker/1:291:4246 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d2a08000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:292:4248 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:292   state:D stack:0     pid:4248  tgid:4248  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eac15d84 r8:00000002 r7:60000113 r6:eac15d8c r5:84f1ec00
 r4:84f1ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f1ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac15e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f910c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f1ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e48fd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a178c r4:851a1400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a178c r4:84deda80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f1ec00 r8:84dedaac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84deda80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84deda80 r8:80287e08 r7:eabe1e60 r6:84f99b80 r5:84f1ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac15fb0 to 0xeac15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f91ec0
INFO: task kworker/1:292:4248 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d2a08000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:293:4250 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:293   state:D stack:0     pid:4250  tgid:4250  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eac19d84 r8:00000002 r7:60000013 r6:eac19d8c r5:84f1d400
 r4:84f1d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f1d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac19e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f97040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f1d400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e8921000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a1b8c r4:851a1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a1b8c r4:84dedb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f1d400 r8:84dedb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dedb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dedb00 r8:80287e08 r7:eabe1e60 r6:84f99c00 r5:84f1d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac19fb0 to 0xeac19ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f914c0
INFO: task kworker/1:293:4250 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d3518000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:294:4253 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:294   state:D stack:0     pid:4253  tgid:4253  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eac1dd84 r8:00000002 r7:60000113 r6:eac1dd8c r5:84f1e000
 r4:84f1e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f1e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac1de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f97240
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f1e000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e8979000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a238c r4:851a2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a238c r4:84deda00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f1e000 r8:84deda2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84deda00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84deda00 r8:80287e08 r7:eabe1e60 r6:84f99c80 r5:84f1e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac1dfb0 to 0xeac1dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f97380
INFO: task kworker/1:294:4253 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d3518000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:295:4255 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:295   state:D stack:0     pid:4255  tgid:4255  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eac21d84 r8:00000002 r7:60000113 r6:eac21d8c r5:851d6c00
 r4:851d6c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:851d6c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac21e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f97600
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:851d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea9a3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a2b8c r4:851a2800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a2b8c r4:84ded780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:851d6c00 r8:84ded7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84ded780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84ded780 r8:80287e08 r7:eac1de60 r6:84f99d00 r5:851d6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac21fb0 to 0xeac21ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f970c0
INFO: task kworker/1:295:4255 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d3efe000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:296:4258 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:296   state:D stack:0     pid:4258  tgid:4258  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eabc1d84 r8:00000002 r7:60000013 r6:eabc1d8c r5:85166c00
 r4:85166c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85166c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f97a40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85166c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea9db000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a378c r4:851a3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a378c r4:84dedc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85166c00 r8:84dedc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dedc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dedc00 r8:80287e08 r7:eac21e60 r6:84dedd00 r5:85166c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabc1fb0 to 0xeabc1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f975c0
INFO: task kworker/1:296:4258 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d3efe000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:297:4260 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:297   state:D stack:0     pid:4260  tgid:4260  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eac11d84 r8:00000002 r7:60000013 r6:eac11d8c r5:85163000
 r4:85163000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85163000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac11e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f97680
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85163000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea9af000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a2f8c r4:851a2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a2f8c r4:84dede00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85163000 r8:84dede2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dede00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dede00 r8:80287e08 r7:eabc1e60 r6:84dede80 r5:85163000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac11fb0 to 0xeac11ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f97900
INFO: task kworker/1:297:4260 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d473b000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:298:4262 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:298   state:D stack:0     pid:4262  tgid:4262  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eac25d84 r8:00000002 r7:60000113 r6:eac25d8c r5:85166000
 r4:85166000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85166000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac25e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f97840
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85166000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea9c3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a338c r4:851a3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a338c r4:84dedd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85166000 r8:84deddac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dedd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dedd80 r8:80287e08 r7:eabc1e60 r6:84dedf80 r5:85166000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac25fb0 to 0xeac25ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f97780
INFO: task kworker/1:298:4262 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d4bd6000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:299:4264 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:299   state:D stack:0     pid:4264  tgid:4264  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eac29d84 r8:00000002 r7:60000013 r6:eac29d8c r5:85165400
 r4:85165400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85165400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac29e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f97bc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85165400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea9ed000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a3b8c r4:851a3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a3b8c r4:84e7ff80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85165400 r8:84e7ffac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84e7ff80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e7ff80 r8:80287e08 r7:eabc1e60 r6:84dedc80 r5:85165400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac29fb0 to 0xeac29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f97a00
INFO: task kworker/1:299:4264 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d4bd6000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:300:4265 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:300   state:D stack:0     pid:4265  tgid:4265  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eabd1d84 r8:00000002 r7:60000013 r6:eabd1d8c r5:85164800
 r4:85164800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85164800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8b040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85164800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaac7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a438c r4:851a4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a438c r4:84d86000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85164800 r8:84d8602c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d86000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d86000 r8:80287e08 r7:eac29e60 r6:84d86080 r5:85164800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabd1fb0 to 0xeabd1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f97b80
INFO: task kworker/1:300:4265 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d5128000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:274:4268 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:274   state:D stack:0     pid:4268  tgid:4268  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eac35d84 r8:00000002 r7:60000113 r6:eac35d8c r5:8515ec00
 r4:8515ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8515ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac35e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e09040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8515ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa25000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85148b8c r4:85148800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85148b8c r4:84f99e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8515ec00 r8:84f99eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84f99e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f99e80 r8:80287e08 r7:eabc5e60 r6:84d86100 r5:8515ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac35fb0 to 0xeac35ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8502f2c0
INFO: task kworker/0:274:4268 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d5128000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:275:4269 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:275   state:D stack:0     pid:4269  tgid:4269  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eac39d84 r8:00000002 r7:60000113 r6:eac39d8c r5:85162400
 r4:85162400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85162400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac39e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843e4240
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85162400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e058f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85149b8c r4:85149800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85149b8c r4:84f99f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85162400 r8:84f99f2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84f99f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f99f00 r8:80287e08 r7:eac35e60 r6:84d86200 r5:85162400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac39fb0 to 0xeac39ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e09080
INFO: task kworker/0:275:4269 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d58ff000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:301:4270 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:301   state:D stack:0     pid:4270  tgid:4270  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eac3dd84 r8:00000002 r7:60000013 r6:eac3dd8c r5:85170000
 r4:85170000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85170000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac3de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84301d80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85170000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaab5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a3f8c r4:851a3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a3f8c r4:84d86180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85170000 r8:84d861ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d86180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d86180 r8:80287e08 r7:eabd1e60 r6:84d86280 r5:85170000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac3dfb0 to 0xeac3dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f97f00
INFO: task kworker/1:301:4270 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d6072000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:276:4272 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:276   state:D stack:0     pid:4272  tgid:4272  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eac49d84 r8:00000002 r7:60000113 r6:eac49d8c r5:85171800
 r4:85171800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85171800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac49e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e09280
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85171800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaaff000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85148f8c r4:85148c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85148f8c r4:84f99f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85171800 r8:84f99fac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84f99f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f99f80 r8:80287e08 r7:eac39e60 r6:84d86300 r5:85171800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac49fb0 to 0xeac49ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e09080
INFO: task kworker/0:276:4272 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d6072000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:302:4275 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:302   state:D stack:0     pid:4275  tgid:4275  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eac2dd84 r8:00000002 r7:60000113 r6:eac2dd8c r5:85172400
 r4:85172400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85172400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac2de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8b500
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85172400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac41000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a4b8c r4:851a4800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a4b8c r4:84d86480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85172400 r8:84d864ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d86480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d86480 r8:80287e08 r7:eabd1e60 r6:84d86500 r5:85172400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac2dfb0 to 0xeac2dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f8b0c0
INFO: task kworker/1:302:4275 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d6205000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:303:4277 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:303   state:D stack:0     pid:4277  tgid:4277  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eac4dd84 r8:00000002 r7:60000013 r6:eac4dd8c r5:85173c00
 r4:85173c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85173c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac4de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8b1c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85173c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaad5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a478c r4:851a4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a478c r4:84d86380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85173c00 r8:84d863ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d86380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d86380 r8:80287e08 r7:eac2de60 r6:84d86600 r5:85173c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac4dfb0 to 0xeac4dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f8b180
INFO: task kworker/1:303:4277 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d67b0000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:304:4280 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:304   state:D stack:0     pid:4280  tgid:4280  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eac51d84 r8:00000002 r7:60000113 r6:eac51d8c r5:85173000
 r4:85173000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85173000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac51e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8b9c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85173000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac6f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a578c r4:851a5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a578c r4:84d86400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85173000 r8:84d8642c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d86400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d86400 r8:80287e08 r7:eac2de60 r6:84d86700 r5:85173000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac51fb0 to 0xeac51ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f8b4c0
INFO: task kworker/1:304:4280 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d6c73000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:305:4281 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:305   state:D stack:0     pid:4281  tgid:4281  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eac59d84 r8:00000002 r7:60000113 r6:eac59d8c r5:85175400
 r4:85175400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85175400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac59e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8b740
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85175400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac5b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a4f8c r4:851a4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a4f8c r4:84d86580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85175400 r8:84d865ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d86580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d86580 r8:80287e08 r7:eac51e60 r6:84d86680 r5:85175400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac59fb0 to 0xeac59ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f8b4c0
INFO: task kworker/1:305:4281 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d6c73000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:306:4284 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:306   state:D stack:0     pid:4284  tgid:4284  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eac31d84 r8:00000002 r7:60000013 r6:eac31d8c r5:85176000
 r4:85176000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85176000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac31e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8b7c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85176000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac61000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a538c r4:851a5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a538c r4:84d86780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85176000 r8:84d867ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d86780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d86780 r8:80287e08 r7:eac51e60 r6:84d86880 r5:85176000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac31fb0 to 0xeac31ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f8b800
INFO: task kworker/1:306:4284 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d7a51000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:277:4286 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:277   state:D stack:0     pid:4286  tgid:4286  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eac81d84 r8:00000002 r7:60000113 r6:eac81d8c r5:8516b000
 r4:8516b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8516b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac81e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843e4100
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516b000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e050b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8514978c r4:85149400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8514978c r4:84e07f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516b000 r8:84e07f2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e07f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e07f00 r8:80287e08 r7:eac39e60 r6:84e07e80 r5:8516b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac81fb0 to 0xeac81ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e095c0
INFO: task kworker/0:277:4286 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d7a51000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:307:4288 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:307   state:D stack:0     pid:4288  tgid:4288  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eac89d84 r8:00000002 r7:60000113 r6:eac89d8c r5:85168c00
 r4:85168c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85168c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac89e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8bb00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac75000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a5b8c r4:851a5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a5b8c r4:84d86900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168c00 r8:84d8692c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d86900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d86900 r8:80287e08 r7:eac51e60 r6:84e07f80 r5:85168c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac89fb0 to 0xeac89ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f8b980
INFO: task kworker/1:307:4288 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
 r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eac99d84 r8:00000002 r7:60000013 r6:eac99d8c r5:8516c800
 r4:8516c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8516c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac99e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8bf00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8516c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eacaf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a678c r4:851a6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a678c r4:84d86980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516c800 r8:84d869ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d86980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d86980 r8:80287e08 r7:eac89e60 r6:84f99d80 r5:8516c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac99fb0 to 0xeac99ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f8ba40
INFO: task kworker/1:308:4290 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d8217000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84d86a80 r8:80287e08 r7:eac99e60 r6:84f99e00 r5:8516d400
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
1d20:                   d8763000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:310:4293 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:310   state:D stack:0     pid:4293  tgid:4293  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaca9d84 r8:00000002 r7:60000113 r6:eaca9d8c r5:8516ec00
 r4:8516ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8516ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8be00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8516ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac91000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a638c r4:851a6000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a638c r4:84d86a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516ec00 r8:84d86a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d86a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d86a00 r8:80287e08 r7:eac99e60 r6:84572000 r5:8516ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaca9fb0 to 0xeaca9ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:311   state:D stack:0     pid:4294  tgid:4294  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacade08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:ddde2d80 r6:83018200 r5:851a6b8c r4:84d86b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516bc00 r8:84d86bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d86b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d86b80 r8:80287e08 r7:eac99e60 r6:84572080 r5:8516bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacadfb0 to 0xeacadff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f8bdc0
INFO: task kworker/1:311:4294 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d89e0000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
 r5:00001000 r4:dfd45000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a738c r4:851a7000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a738c r4:84d86800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516a400 r8:84d8682c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d86800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d86800 r8:80287e08 r7:eacade60 r6:84572100 r5:8516a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac6dfb0 to 0xeac6dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f8bfc0
INFO: task kworker/1:312:4298 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d89e0000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r5:00001000 r4:dfeb3000
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
 r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
 r5:8516e000 r4:8291a680
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502f640
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eacb9d84 r8:00000002 r7:60000113 r6:eacb9d8c r5:851d6000
 r4:851d6000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:851d6000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84585140
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:851d6000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0005000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a778c r4:851a7400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a778c r4:84d86d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:851d6000 r8:84d86d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d86d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d86d00 r8:80287e08 r7:eac6de60 r6:84572180 r5:851d6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacb9fb0 to 0xeacb9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84585240
INFO: task kworker/1:314:4303 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d9658000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r5:84e5378c r4:84e53400
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84d86d80 r8:80287e08 r7:eacb9e60 r6:84572200 r5:85169800
 r4:84585380
Call trace: 
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
INFO: task kworker/1:316:4306 blocked for more than 460 seconds.
 r4:851d8c00
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc5e08
 r5:00001000 r4:e004f000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84d86b00 r8:80287e08 r7:eacbde60 r6:84572300 r5:851d8c00
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84585380
INFO: task kworker/1:316:4306 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d9b00000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:317:4307 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:317   state:D stack:0     pid:4307  tgid:4307  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eacc9d84 r8:00000002 r7:60000113 r6:eacc9d8c r5:851d9800
 r4:851d9800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:851d9800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84585440
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:851d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e046d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851a7f8c r4:851a7c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851a7f8c r4:84d86e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:851d9800 r8:84d86eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d86e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d86e80 r8:80287e08 r7:eacbde60 r6:84572380 r5:851d9800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacc9fb0 to 0xeacc9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845851c0
INFO: task kworker/1:317:4307 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   da195000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:8291a684 r9:eacd1d84 r8:00000002 r7:60000013 r6:eacd1d8c r5:851db000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ac78c r4:851ac400
 r7:ddde2d80 r6:83018200 r5:851ac78c r4:84d86f00
 r4:84d86f00
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r5:00001000 r4:dfeb3000
 r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
 r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:320:4315 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:320   state:D stack:0     pid:4315  tgid:4315  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaca5d84 r8:00000002 r7:60000113 r6:eaca5d8c r5:851d8000
 r4:851d8000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:851d8000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84585d40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:851d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0663000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ad38c r4:851ad000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851ad38c r4:84dedb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:851d8000 r8:84dedbac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dedb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dedb80 r8:80287e08 r7:eacd9e60 r6:84572500 r5:851d8000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaca5fb0 to 0xeaca5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84585600
INFO: task kworker/1:320:4315 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   db15c000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:851dc800 r8:845726ac r7:82804d40 r6:dddced80 r5:dddceda0
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:279   state:D stack:0     pid:4319  tgid:4319  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eac65d84 r8:00000002 r7:60000013 r6:eac65d8c r5:851dd400
 r4:851dd400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:851dd400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac65e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8458e100
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:851dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf31000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8514bb8c r4:8514b800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8514bb8c r4:84572700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:851dd400 r8:8457272c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84572700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84572700 r8:80287e08 r7:eacd5e60 r6:84572580 r5:851dd400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac65fb0 to 0xeac65ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:843e4300
INFO: task kworker/0:279:4319 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   dbac1000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
task:kworker/0:280   state:D stack:0     pid:4320  tgid:4320  ppid:2      task_flags:0x4208060 flags:0x00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:00000000
1d20:                   dbcad000 eca77000 00000001 80239b98 7f035000 00000001
 r4:00000000
 r5:00001000 r4:dfeb3000
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fa0:                                     00000000 00000000 00000000 00000000
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:281   state:D stack:0     pid:4321  tgid:4321  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eacddd84 r8:00000002 r7:60000113 r6:eacddd8c r5:851dec00
 r4:851dec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:851dec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacdde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d54080
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:851dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadc7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8514a78c r4:8514a400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8514a78c r4:84572880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:851dec00 r8:845728ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84572880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84572880 r8:80287e08 r7:eac65e60 r6:84572900 r5:851dec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacddfb0 to 0xeacddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:843e4300
INFO: task kworker/0:281:4321 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   dc203000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:321:4323 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:321   state:D stack:0     pid:4323  tgid:4323  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eace9d84 r8:00000002 r7:60000113 r6:eace9d8c r5:851dbc00
 r4:851dbc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:851dbc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84585e00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:851dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0701000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ad78c r4:851ad400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851ad78c r4:8503ce80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:851dbc00 r8:8503ceac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8503ce80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8503ce80 r8:80287e08 r7:eaca5e60 r6:84572980 r5:851dbc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeace9fb0 to 0xeace9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84585a40
INFO: task kworker/1:321:4323 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   dc203000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fa0:                                     00000000 00000000 00000000 00000000
task:kworker/1:322   state:D stack:0     pid:4326  tgid:4326  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf5e08
 r5:00001000 r4:e071d000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xeacf5fb0 to 0xeacf5ff8)
 r4:84585e40
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r4:84d87ac0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ae38c r4:851ae000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851ae38c r4:84df2180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f7a400 r8:84df21ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84df2180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84df2180 r8:80287e08 r7:eacf5e60 r6:84572a80 r5:84f7a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacfdfb0 to 0xeacfdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84585e80
INFO: task kworker/1:323:4328 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   dc6a6000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:84f78000 r8:84df212c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:325:4332 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:325   state:D stack:0     pid:4332  tgid:4332  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead09d84 r8:00000002 r7:60000013 r6:ead09d8c r5:84f79800
 r4:84f79800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f79800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead09e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dc2340
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f79800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e48a1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851aef8c r4:851aec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851aef8c r4:84df2200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f79800 r8:84df222c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84df2200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84df2200 r8:80287e08 r7:eacfde60 r6:84572b80 r5:84f79800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead09fb0 to 0xead09ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e09e80
INFO: task kworker/1:325:4332 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   dca8a000 eca77000 00000001 80239b98 7f035000 00000001
 r4:dffe1dc0
 r5:84e5378c r4:84e53400
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r5:84f7bc00 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:00001000 r4:e0837000
 r5:851ae78c r4:851ae400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f7bc00 r8:84df232c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84df2300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84df2300 r8:80287e08 r7:ead09e60 r6:84572c00 r5:84f7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead0dfb0 to 0xead0dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8502f980
INFO: task kworker/1:326:4333 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   dca8a000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:327:4336 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:327   state:D stack:0     pid:4336  tgid:4336  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead11d84 r8:00000002 r7:60000013 r6:ead11d8c r5:84f7c800
 r4:84f7c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f7c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead11e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851aeb8c r4:851ae800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:84df2080 r8:80287e08 r7:ead09e60 r6:84572c80 r5:84f7c800
INFO: task kworker/1:327:4336 is blocked on a mutex likely owned by task kworker/0:123:3540.
1d20:                   dcea3000 eca77000 00000001 80239b98 7f035000 00000001
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018205 r8:84f7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
 r5:851af38c r4:851af000
 r10:61c88647 r9:84f7d400 r8:84df23ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
INFO: task kworker/1:328:4337 is blocked on a mutex likely owned by task kworker/0:123:3540.
1d20:                   dcea3000 eca77000 00000001 80239b98 7f035000 00000001
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dc2540
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f7e000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e8957000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84df2480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f7e000 r8:84df24ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84df2480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84df2480 r8:80287e08 r7:ead15e60 r6:84572d80 r5:84f7e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead19fb0 to 0xead19ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dc2480
INFO: task kworker/1:329:4340 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   dd211000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:330:4342 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:330   state:D stack:0     pid:4342  tgid:4342  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead1dd84 r8:00000002 r7:60000013 r6:ead1dd8c r5:84f7ec00
 r4:84f7ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f7ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead1de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r9:83018205 r8:84f7ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
 r5:851afb8c r4:851af800
 r10:61c88647 r9:84f7ec00 r8:84df252c r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   dd34d000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead21e08
 r9:83018205 r8:84f7b000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
 r5:851aff8c r4:851afc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead21fb0 to 0xead21ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dc2700
INFO: task kworker/1:331:4344 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   dd5cc000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:332:4346 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:332   state:D stack:0     pid:4346  tgid:4346  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r10:8291a684 r9:ead25d84 r8:00000002 r7:60000113 r6:ead25d8c r5:85168000
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
 r5:851b038c r4:851b0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851b038c r4:84df2580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:84df25ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:00000001
5fa0:                                     00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace: 
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r4:82ac21e4
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:333:4348 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:333   state:D stack:0     pid:4348  tgid:4348  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead29d84 r8:00000002 r7:60000113 r6:ead29d8c r5:851e0000
 r4:851e0000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:851e0000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead29e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dc2ac0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:851e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab8d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851b078c r4:851b0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851b078c r4:84df2680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:851e0000 r8:84df26ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84df2680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84df2680 r8:80287e08 r7:ead25e60 r6:84572f80 r5:851e0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead29fb0 to 0xead29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dc2440
INFO: task kworker/1:333:4348 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   dd8a2000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:334:4350 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:334   state:D stack:0     pid:4350  tgid:4350  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eabb9d84 r8:00000002 r7:60000013 r6:eabb9d8c r5:851e0c00
 r4:851e0c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:851e0c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dc2c00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:851e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9f3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851b0b8c r4:851b0800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851b0b8c r4:84df2700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:851e0c00 r8:84df272c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84df2700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84df2700 r8:80287e08 r7:ead29e60 r6:84e16000 r5:851e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabb9fb0 to 0xeabb9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dc2a00
INFO: task kworker/1:334:4350 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ddb34000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:335:4352 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:335   state:D stack:0     pid:4352  tgid:4352  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eace5d84 r8:00000002 r7:60000113 r6:eace5d8c r5:85176c00
 r4:85176c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85176c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dc2d40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85176c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc29000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851b0f8c r4:851b0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851b0f8c r4:84df2780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85176c00 r8:84df27ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84df2780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84df2780 r8:80287e08 r7:eabb9e60 r6:84df2800 r5:85176c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeace5fb0 to 0xeace5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dc2a00
INFO: task kworker/1:335:4352 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ddd6d000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:336:4354 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:336   state:D stack:0     pid:4354  tgid:4354  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eac09d84 r8:00000002 r7:60000113 r6:eac09d8c r5:85105400
 r4:85105400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85105400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac09e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dc2f80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85105400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfde5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851b138c r4:851b1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851b138c r4:84df2880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85105400 r8:84df28ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84df2880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84df2880 r8:80287e08 r7:eace5e60 r6:84df2600 r5:85105400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac09fb0 to 0xeac09ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dc25c0
INFO: task kworker/1:336:4354 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ddff7000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
1fa0:                                     00000000 00000000 00000000 00000000
      Not tainted 6.15.0-rc6-syzkaller #0
 r4:85178000
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac69e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84581000
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85178000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfee5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851b178c r4:851b1400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851b178c r4:84df2400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85178000 r8:84df242c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84df2400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84df2400 r8:80287e08 r7:eac09e60 r6:84df2a00 r5:85178000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac69fb0 to 0xeac69ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dc2f40
INFO: task kworker/1:337:4356 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   de050000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:338:4358 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:338   state:D stack:0     pid:4358  tgid:4358  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eac79d84 r8:00000002 r7:60000113 r6:eac79d8c r5:85179800
 r4:85179800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85179800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac79e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845813c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85179800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e00af000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851b1b8c r4:851b1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851b1b8c r4:84df2900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85179800 r8:84df292c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84df2900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84df2900 r8:80287e08 r7:eac69e60 r6:84df2b00 r5:85179800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac79fb0 to 0xeac79ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84581080
INFO: task kworker/1:338:4358 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   de518000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:339:4361 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:339   state:D stack:0     pid:4361  tgid:4361  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead31d84 r8:00000002 r7:60000113 r6:ead31d8c r5:85178c00
 r4:85178c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85178c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead31e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84581440
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85178c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0109000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851b1f8c r4:851b1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851b1f8c r4:84df2980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85178c00 r8:84df29ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84df2980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84df2980 r8:80287e08 r7:eac79e60 r6:84df2c00 r5:85178c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead31fb0 to 0xead31ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84581380
INFO: task kworker/1:339:4361 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   de89e000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:340:4363 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:340   state:D stack:0     pid:4363  tgid:4363  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eacedd84 r8:00000002 r7:60000113 r6:eacedd8c r5:8517b000
 r4:8517b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8517b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacede08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84581780
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8517b000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e48a3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851b278c r4:851b2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851b278c r4:84df2a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8517b000 r8:84df2aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84df2a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84df2a80 r8:80287e08 r7:ead31e60 r6:84df2c80 r5:8517b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacedfb0 to 0xeacedff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84581700
INFO: task kworker/1:340:4363 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   dec17000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:341:4365 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:341   state:D stack:0     pid:4365  tgid:4365  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead35d84 r8:00000002 r7:60000013 r6:ead35d8c r5:8517bc00
 r4:8517bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8517bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead35e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84581680
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8517bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0141000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851b238c r4:851b2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851b238c r4:84df2d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8517bc00 r8:84df2dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84df2d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84df2d80 r8:80287e08 r7:eacede60 r6:84df2e00 r5:8517bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead35fb0 to 0xead35ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84581540
INFO: task kworker/1:341:4365 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   df0cb000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:342:4367 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:342   state:D stack:0     pid:4367  tgid:4367  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead39d84 r8:00000002 r7:60000113 r6:ead39d8c r5:8517c800
 r4:8517c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8517c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead39e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845818c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8517c800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e48ed000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851b2b8c r4:851b2800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851b2b8c r4:84df2f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8517c800 r8:84df2f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84df2f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84df2f00 r8:80287e08 r7:eacede60 r6:84df2b80 r5:8517c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead39fb0 to 0xead39ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845819c0
INFO: task kworker/1:342:4367 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   df0cb000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:343:4370 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:343   state:D stack:0     pid:4370  tgid:4370  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead3dd84 r8:00000002 r7:60000113 r6:ead3dd8c r5:8517d400
 r4:8517d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8517d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead3de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84581a80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8517d400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e892f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851b2f8c r4:851b2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851b2f8c r4:84df2f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8517d400 r8:84df2fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84df2f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84df2f80 r8:80287e08 r7:ead39e60 r6:84df2d00 r5:8517d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead3dfb0 to 0xead3dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84581800
INFO: task kworker/1:343:4370 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   df511000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:344:4371 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:344   state:D stack:0     pid:4371  tgid:4371  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead41d84 r8:00000002 r7:60000013 r6:ead41d8c r5:8517e000
 r4:8517e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8517e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead41e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84581bc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8517e000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e8977000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851b338c r4:851b3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851b338c r4:84dedf00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8517e000 r8:84dedf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dedf00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dedf00 r8:80287e08 r7:ead3de60 r6:84d86c80 r5:8517e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead41fb0 to 0xead41ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84581cc0
INFO: task kworker/1:344:4371 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   df511000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:345:4373 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:345   state:D stack:0     pid:4373  tgid:4373  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead49d84 r8:00000002 r7:60000013 r6:ead49d8c r5:8517a400
 r4:8517a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8517a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead49e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84581ec0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8517a400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea999000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851b378c r4:851b3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851b378c r4:84deb080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8517a400 r8:84deb0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84deb080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84deb080 r8:80287e08 r7:ead41e60 r6:84deb000 r5:8517a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead49fb0 to 0xead49ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84581940
INFO: task kworker/1:345:4373 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   df7b7000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:346:4375 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:346   state:D stack:0     pid:4375  tgid:4375  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead4dd84 r8:00000002 r7:60000113 r6:ead4dd8c r5:85174800
 r4:85174800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85174800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead4de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d9040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85174800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea9a9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851b3b8c r4:851b3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851b3b8c r4:84deb100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85174800 r8:84deb12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84deb100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84deb100 r8:80287e08 r7:ead49e60 r6:84deb280 r5:85174800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead4dfb0 to 0xead4dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84581d80
INFO: task kworker/1:346:4375 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   dfc2f000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:347:4377 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:347   state:D stack:0     pid:4377  tgid:4377  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead51d84 r8:00000002 r7:60000013 r6:ead51d8c r5:85170c00
 r4:85170c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85170c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead51e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d91c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85170c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea9c7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851b3f8c r4:851b3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851b3f8c r4:84deb180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85170c00 r8:84deb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84deb180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84deb180 r8:80287e08 r7:ead4de60 r6:84deb300 r5:85170c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead51fb0 to 0xead51ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847d92c0
INFO: task kworker/1:347:4377 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   dff8f000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:348:4379 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:348   state:D stack:0     pid:4379  tgid:4379  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead45d84 r8:00000002 r7:60000113 r6:ead45d8c r5:85180000
 r4:85180000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85180000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead45e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d93c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85180000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea9eb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851bc38c r4:851bc000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851bc38c r4:84deb380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85180000 r8:84deb3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84deb380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84deb380 r8:80287e08 r7:ead51e60 r6:84deb480 r5:85180000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead45fb0 to 0xead45ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847d9180
INFO: task kworker/1:348:4379 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   dff8f000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:349:4381 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:349   state:D stack:0     pid:4381  tgid:4381  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead55d84 r8:00000002 r7:60000013 r6:ead55d8c r5:85180c00
 r4:85180c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85180c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead55e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d9780
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85180c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaab3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851bcb8c r4:851bc800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851bcb8c r4:84deb200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85180c00 r8:84deb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84deb200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84deb200 r8:80287e08 r7:ead45e60 r6:84deb580 r5:85180c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead55fb0 to 0xead55ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847d9380
INFO: task kworker/1:349:4381 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e0426000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:350:4383 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:350   state:D stack:0     pid:4383  tgid:4383  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead59d84 r8:00000002 r7:60000113 r6:ead59d8c r5:85181800
 r4:85181800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85181800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead59e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d9540
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85181800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa0d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851bc78c r4:851bc400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851bc78c r4:84deb400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85181800 r8:84deb42c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84deb400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84deb400 r8:80287e08 r7:ead55e60 r6:84deb680 r5:85181800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead59fb0 to 0xead59ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847d9500
INFO: task kworker/1:350:4383 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e0426000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:351:4385 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:351   state:D stack:0     pid:4385  tgid:4385  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead5dd84 r8:00000002 r7:60000013 r6:ead5dd8c r5:85182400
 r4:85182400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85182400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead5de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d9880
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85182400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaac9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851bcf8c r4:851bcc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851bcf8c r4:84deb500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85182400 r8:84deb52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84deb500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84deb500 r8:80287e08 r7:ead55e60 r6:84deb700 r5:85182400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead5dfb0 to 0xead5dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847d9680
INFO: task kworker/1:351:4385 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e08f1000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:352:4387 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:352   state:D stack:0     pid:4387  tgid:4387  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead65d84 r8:00000002 r7:60000013 r6:ead65d8c r5:85183c00
 r4:85183c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85183c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead65e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d9c80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85183c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabbd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851bd78c r4:851bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851bd78c r4:84deb600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85183c00 r8:84deb62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84deb600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84deb600 r8:80287e08 r7:ead5de60 r6:84deb880 r5:85183c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead65fb0 to 0xead65ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847d9840
INFO: task kworker/1:352:4387 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e0d6e000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:353:4389 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:353   state:D stack:0     pid:4389  tgid:4389  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead6dd84 r8:00000002 r7:60000113 r6:ead6dd8c r5:851e3c00
 r4:851e3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:851e3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead6de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d9b00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:851e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaae1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851bd38c r4:851bd000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851bd38c r4:84deb780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:851e3c00 r8:84deb7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84deb780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84deb780 r8:80287e08 r7:ead65e60 r6:84e16080 r5:851e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead6dfb0 to 0xead6dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847d9c00
INFO: task kworker/1:353:4389 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e1125000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:354:4391 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:354   state:D stack:0     pid:4391  tgid:4391  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead75d84 r8:00000002 r7:60000113 r6:ead75d8c r5:851e1800
 r4:851e1800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:851e1800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead75e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d9d40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:851e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabdb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851bdb8c r4:851bd800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851bdb8c r4:84deb980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:851e1800 r8:84deb9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84deb980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84deb980 r8:80287e08 r7:ead65e60 r6:84e16200 r5:851e1800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead75fb0 to 0xead75ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847d9c40
INFO: task kworker/1:354:4391 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e1125000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:355:4393 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:355   state:D stack:0     pid:4393  tgid:4393  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead7dd84 r8:00000002 r7:60000113 r6:ead7dd8c r5:851e6000
 r4:851e6000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:851e6000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead7de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d9ec0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:851e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabe9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851bdf8c r4:851bdc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851bdf8c r4:84deb900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:851e6000 r8:84deb92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84deb900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84deb900 r8:80287e08 r7:ead75e60 r6:84e16100 r5:851e6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead7dfb0 to 0xead7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847d9c00
INFO: task kworker/1:355:4393 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e15f1000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:356:4394 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:356   state:D stack:0     pid:4394  tgid:4394  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead81d84 r8:00000002 r7:60000113 r6:ead81d8c r5:851e4800
 r4:851e4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:851e4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead81e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d9680
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:851e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabf7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851be38c r4:851be000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851be38c r4:84deba00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:851e4800 r8:84deba2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84deba00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84deba00 r8:80287e08 r7:ead7de60 r6:84e16180 r5:851e4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead81fb0 to 0xead81ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847d9c00
INFO: task kworker/1:356:4394 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e15f1000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:357:4397 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:357   state:D stack:0     pid:4397  tgid:4397  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead8dd84 r8:00000002 r7:60000113 r6:ead8dd8c r5:851e5400
 r4:851e5400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:851e5400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead8de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e2200
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:851e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac55000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851beb8c r4:851be800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851beb8c r4:84deb800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:851e5400 r8:84deb82c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84deb800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84deb800 r8:80287e08 r7:ead81e60 r6:84e16280 r5:851e5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead8dfb0 to 0xead8dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84c27d40
INFO: task kworker/1:357:4397 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e15f1000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:358:4399 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:358   state:D stack:0     pid:4399  tgid:4399  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead95d84 r8:00000002 r7:60000113 r6:ead95d8c r5:851e2400
 r4:851e2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:851e2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead95e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e2000
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:851e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac01000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851be78c r4:851be400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851be78c r4:84debb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:851e2400 r8:84debb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84debb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84debb00 r8:80287e08 r7:ead8de60 r6:84e16300 r5:851e2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead95fb0 to 0xead95ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e2240
INFO: task kworker/1:358:4399 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e1e8e000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:359:4401 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:359   state:D stack:0     pid:4401  tgid:4401  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead9dd84 r8:00000002 r7:60000113 r6:ead9dd8c r5:8517ec00
 r4:8517ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8517ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead9de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e22c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8517ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac71000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851bef8c r4:851bec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851bef8c r4:84deba80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8517ec00 r8:84debaac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84deba80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84deba80 r8:80287e08 r7:ead8de60 r6:84e16380 r5:8517ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead9dfb0 to 0xead9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e2240
INFO: task kworker/1:359:4401 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e1e8e000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:360:4404 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:360   state:D stack:0     pid:4404  tgid:4404  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eada9d84 r8:00000002 r7:60000013 r6:eada9d8c r5:84f28c00
 r4:84f28c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f28c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e2400
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f28c00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac7d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851bf38c r4:851bf000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851bf38c r4:84debc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f28c00 r8:84debc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84debc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84debc00 r8:80287e08 r7:ead9de60 r6:84e16400 r5:84f28c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeada9fb0 to 0xeada9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e2280
INFO: task kworker/1:360:4404 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e1e8e000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:361:4405 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:361   state:D stack:0     pid:4405  tgid:4405  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eadadd84 r8:00000002 r7:60000113 r6:eadadd8c r5:84f29800
 r4:84f29800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f29800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadade08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e2540
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f29800 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac8d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851bf78c r4:851bf400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851bf78c r4:84debc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f29800 r8:84debcac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84debc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84debc80 r8:80287e08 r7:eada9e60 r6:84e16480 r5:84f29800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadadfb0 to 0xeadadff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e2280
INFO: task kworker/1:361:4405 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e22ce000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:362:4407 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:362   state:D stack:0     pid:4407  tgid:4407  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead61d84 r8:00000002 r7:60000113 r6:ead61d8c r5:85184800
 r4:85184800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85184800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead61e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e2680
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85184800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac95000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851bfb8c r4:851bf800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851bfb8c r4:84debd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85184800 r8:84debd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84debd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84debd00 r8:80287e08 r7:eadade60 r6:84debd80 r5:85184800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead61fb0 to 0xead61ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e2340
INFO: task kworker/1:362:4407 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e261f000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:363:4409 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:363   state:D stack:0     pid:4409  tgid:4409  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead69d84 r8:00000002 r7:60000013 r6:ead69d8c r5:85185400
 r4:85185400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85185400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead69e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e2a40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85185400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadb7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8523438c r4:85234000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8523438c r4:84debe00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85185400 r8:84debe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84debe00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84debe00 r8:80287e08 r7:ead61e60 r6:84debb80 r5:85185400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead69fb0 to 0xead69ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e2340
INFO: task kworker/1:363:4409 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e294a000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:364:4411 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:364   state:D stack:0     pid:4411  tgid:4411  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eadb5d84 r8:00000002 r7:60000013 r6:eadb5d8c r5:85186c00
 r4:85186c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85186c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e2880
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85186c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eacb1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851bff8c r4:851bfc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851bff8c r4:84df2e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85186c00 r8:84df2eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84df2e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84df2e80 r8:80287e08 r7:ead69e60 r6:84debe80 r5:85186c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadb5fb0 to 0xeadb5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e2840
INFO: task kworker/1:364:4411 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e294a000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:365:4413 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:365   state:D stack:0     pid:4413  tgid:4413  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eadc1d84 r8:00000002 r7:60000113 r6:eadc1d8c r5:84f2a400
 r4:84f2a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f2a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e2c00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f2a400 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadbd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8523478c r4:85234400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8523478c r4:84d53000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f2a400 r8:84d5302c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d53000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d53000 r8:80287e08 r7:ead69e60 r6:84e16500 r5:84f2a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadc1fb0 to 0xeadc1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e2a00
INFO: task kworker/1:365:4413 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e2aec000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:366:4415 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:366   state:D stack:0     pid:4415  tgid:4415  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eadb1d84 r8:00000002 r7:60000013 r6:eadb1d8c r5:84f2b000
 r4:84f2b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f2b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e128c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f2b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eade5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85234f8c r4:85234c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85234f8c r4:84d53080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f2b000 r8:84d530ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d53080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d53080 r8:80287e08 r7:eadc1e60 r6:84e16580 r5:84f2b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadb1fb0 to 0xeadb1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e2980
INFO: task kworker/1:366:4415 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e2dd2000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:282:4418 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:282   state:D stack:0     pid:4418  tgid:4418  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eadd1d84 r8:00000002 r7:60000113 r6:eadd1d8c r5:84f2bc00
 r4:84f2bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f2bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d541c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84f2bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadcd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8514ab8c r4:8514a800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8514ab8c r4:84e16700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f2bc00 r8:84e1672c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e16700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e16700 r8:80287e08 r7:eac65e60 r6:84e16780 r5:84f2bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadd1fb0 to 0xeadd1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d542c0
INFO: task kworker/0:282:4418 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e3351000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:367:4419 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:367   state:D stack:0     pid:4419  tgid:4419  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eadddd84 r8:00000002 r7:60000013 r6:eadddd8c r5:84f2c800
 r4:84f2c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f2c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaddde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e2f00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f2c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaddf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85234b8c r4:85234800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85234b8c r4:84d53200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f2c800 r8:84d5322c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d53200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d53200 r8:80287e08 r7:eadb1e60 r6:84e16600 r5:84f2c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadddfb0 to 0xeadddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e2e00
INFO: task kworker/1:367:4419 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e3351000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:283:4421 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:283   state:D stack:0     pid:4421  tgid:4421  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eade9d84 r8:00000002 r7:60000113 r6:eade9d8c r5:84f2d400
 r4:84f2d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f2d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d54700
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84f2d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8514b38c r4:8514b000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8514b38c r4:84e16680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f2d400 r8:84e166ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e16680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e16680 r8:80287e08 r7:eac65e60 r6:84e16800 r5:84f2d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeade9fb0 to 0xeade9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d54100
INFO: task kworker/0:283:4421 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e3351000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:368:4423 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:368   state:D stack:0     pid:4423  tgid:4423  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eadf1d84 r8:00000002 r7:60000113 r6:eadf1d8c r5:84f2e000
 r4:84f2e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f2e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f2e000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0029000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8523578c r4:85235400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8523578c r4:84d53100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f2e000 r8:84d5312c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d53100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d53100 r8:80287e08 r7:eadb1e60 r6:84e16880 r5:84f2e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadf1fb0 to 0xeadf1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e12cc0
INFO: task kworker/1:368:4423 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e363e000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:369:4424 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:369   state:D stack:0     pid:4424  tgid:4424  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eadf5d84 r8:00000002 r7:60000013 r6:eadf5d8c r5:84f2ec00
 r4:84f2ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f2ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e2f80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f2ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9e1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8523538c r4:85235000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8523538c r4:84d53280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f2ec00 r8:84d532ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d53280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d53280 r8:80287e08 r7:eadf1e60 r6:84e16900 r5:84f2ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadf5fb0 to 0xeadf5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e2fc0
INFO: task kworker/1:369:4424 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e39b4000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:370:4429 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:370   state:D stack:0     pid:4429  tgid:4429  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eadd9d84 r8:00000002 r7:60000113 r6:eadd9d8c r5:84f28000
 r4:84f28000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f28000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0200
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f28000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0465000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85235b8c r4:85235800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85235b8c r4:84d53380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f28000 r8:84d533ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d53380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d53380 r8:80287e08 r7:eadf1e60 r6:84e16980 r5:84f28000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadd9fb0 to 0xeadd9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e0000
INFO: task kworker/1:370:4429 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e3b27000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:371:4431 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:371   state:D stack:0     pid:4431  tgid:4431  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eadfdd84 r8:00000002 r7:60000013 r6:eadfdd8c r5:85183000
 r4:85183000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85183000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadfde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0280
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85183000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e04bf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85235f8c r4:85235c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85235f8c r4:84d53400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85183000 r8:84d5342c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d53400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d53400 r8:80287e08 r7:eadd9e60 r6:84d53180 r5:85183000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadfdfb0 to 0xeadfdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e01c0
INFO: task kworker/1:371:4431 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e3b27000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:372:4434 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:372   state:D stack:0     pid:4434  tgid:4434  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eae01d84 r8:00000002 r7:60000113 r6:eae01d8c r5:85186000
 r4:85186000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85186000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae01e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0480
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85186000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e04fb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8523638c r4:85236000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8523638c r4:84d53480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85186000 r8:84d534ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d53480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d53480 r8:80287e08 r7:eadfde60 r6:84d53580 r5:85186000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae01fb0 to 0xeae01ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e02c0
INFO: task kworker/1:372:4434 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e4126000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:284:4435 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:284   state:D stack:0     pid:4435  tgid:4435  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eae09d84 r8:00000002 r7:60000113 r6:eae09d8c r5:852b0c00
 r4:852b0c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:852b0c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae09e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8458e000
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:852b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf2b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8514b78c r4:8514b400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8514b78c r4:84e16a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:852b0c00 r8:84e16aac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e16a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e16a80 r8:80287e08 r7:eac65e60 r6:84e16b00 r5:852b0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae09fb0 to 0xeae09ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d54880
INFO: task kworker/0:284:4435 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e4126000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:373:4436 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:373   state:D stack:0     pid:4436  tgid:4436  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eae0dd84 r8:00000002 r7:60000113 r6:eae0dd8c r5:852b1800
 r4:852b1800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:852b1800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae0de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0600
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:852b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0559000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8523678c r4:85236400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8523678c r4:84d53300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:852b1800 r8:84d5332c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d53300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d53300 r8:80287e08 r7:eae01e60 r6:84e16a00 r5:852b1800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae0dfb0 to 0xeae0dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e0700
INFO: task kworker/1:373:4436 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e4679000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:374:4438 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:374   state:D stack:0     pid:4438  tgid:4438  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eae15d84 r8:00000002 r7:60000113 r6:eae15d8c r5:852b3000
 r4:852b3000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:852b3000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae15e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0780
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:852b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e05bf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85236b8c r4:85236800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85236b8c r4:84d53680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:852b3000 r8:84d536ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d53680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d53680 r8:80287e08 r7:eae0de60 r6:84e16b80 r5:852b3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae15fb0 to 0xeae15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e05c0
INFO: task kworker/1:374:4438 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e4679000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:375:4440 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:375   state:D stack:0     pid:4440  tgid:4440  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eae1dd84 r8:00000002 r7:60000113 r6:eae1dd8c r5:852b2400
 r4:852b2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:852b2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae1de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0800
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:852b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0627000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85236f8c r4:85236c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85236f8c r4:84d53780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:852b2400 r8:84d537ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d53780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d53780 r8:80287e08 r7:eae15e60 r6:84e16c00 r5:852b2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae1dfb0 to 0xeae1dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e0740
INFO: task kworker/1:375:4440 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e46ba000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:376:4441 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:376   state:D stack:0     pid:4441  tgid:4441  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eae21d84 r8:00000002 r7:60000113 r6:eae21d8c r5:852b0000
 r4:852b0000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:852b0000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae21e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0b40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:852b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0789000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8523778c r4:85237400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8523778c r4:84d53500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:852b0000 r8:84d5352c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d53500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d53500 r8:80287e08 r7:eae1de60 r6:84e16c80 r5:852b0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae21fb0 to 0xeae21ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e0740
INFO: task kworker/1:376:4441 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e4a9f000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:377:4443 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:377   state:D stack:0     pid:4443  tgid:4443  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eae29d84 r8:00000002 r7:60000113 r6:eae29d8c r5:852b5400
 r4:852b5400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:852b5400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae29e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0a00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:852b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06f7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8523738c r4:85237000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8523738c r4:84d53800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:852b5400 r8:84d5382c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d53800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d53800 r8:80287e08 r7:eae21e60 r6:84e16d00 r5:852b5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae29fb0 to 0xeae29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e0840
INFO: task kworker/1:377:4443 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e4c36000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:378:4446 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:378   state:D stack:0     pid:4446  tgid:4446  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eae39d84 r8:00000002 r7:60000113 r6:eae39d8c r5:852b4800
 r4:852b4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:852b4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae39e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0f00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:852b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e488b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8527038c r4:85270000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8527038c r4:84d53600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:852b4800 r8:84d5362c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d53600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d53600 r8:80287e08 r7:eae21e60 r6:84e16d80 r5:852b4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae39fb0 to 0xeae39ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e0a80
INFO: task kworker/1:378:4446 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e5053000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:379:4448 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:379   state:D stack:0     pid:4448  tgid:4448  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eae41d84 r8:00000002 r7:60000013 r6:eae41d8c r5:852b6c00
 r4:852b6c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:852b6c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae41e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0bc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:852b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e07ed000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85237b8c r4:85237800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85237b8c r4:84d53880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:852b6c00 r8:84d538ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d53880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d53880 r8:80287e08 r7:eae39e60 r6:84e16e00 r5:852b6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae41fb0 to 0xeae41ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e0c00
INFO: task kworker/1:379:4448 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e5150000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:380:4449 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:380   state:D stack:0     pid:4449  tgid:4449  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eae45d84 r8:00000002 r7:60000113 r6:eae45d8c r5:852b6000
 r4:852b6000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:852b6000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae45e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0dc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:852b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e083f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85237f8c r4:85237c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85237f8c r4:84d53980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:852b6000 r8:84d539ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d53980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d53980 r8:80287e08 r7:eae39e60 r6:84e16e80 r5:852b6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae45fb0 to 0xeae45ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e0c00
INFO: task kworker/1:380:4449 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e55a4000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:00000000
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r5:8527178c r4:85271400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:84d53a00 r8:80287e08 r7:eae39e60 r6:84e16f00 r5:851e6c00
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae61e08
 r5:8527078c r4:85270400
 r10:61c88647 r9:84f00c00 r8:84d5392c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d54f80
INFO: task kworker/1:382:4454 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e55a4000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:383:4455 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:383   state:D stack:0     pid:4455  tgid:4455  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eae65d84 r8:00000002 r7:60000113 r6:eae65d8c r5:84f01800
 r4:84f01800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f01800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae65e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d54dc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f01800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e8969000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85270b8c r4:85270800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85270b8c r4:84d53a80
 r4:00000001
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e59ae000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:84e5378c r4:84e53400
 r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
INFO: task kworker/1:384:4457 blocked for more than 462 seconds.
 r5:84f00000 r4:8291a680
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f63000
 r5:85270f8c r4:85270c00
 r7:ddde2d80 r6:83018200 r5:85270f8c r4:84d53b00
 r4:00000001
 r4:847e0f80
Call trace: 
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
 r5:84f02400 r4:8291a680
 r4:00000000
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:84d53c00
5fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:386:4461 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:386   state:D stack:0     pid:4461  tgid:4461  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eae79d84 r8:00000002 r7:60000113 r6:eae79d8c r5:84f03c00
 r4:84f03c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f03c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae79e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f63840
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f03c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead05000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8527278c r4:85272400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8527278c r4:84d53b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f03c00 r8:84d53bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d53b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d53b80 r8:80287e08 r7:eae4de60 r6:84f67180 r5:84f03c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae79fb0 to 0xeae79ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f632c0
INFO: task kworker/1:386:4461 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e5fa5000 eca77000 00000001 80239b98 7f035000 00000001
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r5:84e5378c r4:84e53400
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
 r5:84f04800 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:85271b8c r4:85271800
 r7:ddde2d80 r6:83018200 r5:85271b8c r4:84d53d00
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f63540
INFO: task kworker/1:387:4463 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e6206000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:388:4465 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:388   state:D stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eae85d84 r8:00000002 r7:60000113 r6:eae85d8c r5:84f06000
 r5:84f06000 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f634c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f06000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaccd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85271f8c r4:85271c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85271f8c r4:84d53d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f06000 r8:84d53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d53d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d53d80 r8:80287e08 r7:eae79e60 r6:84f67280 r5:84f06000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae85fb0 to 0xeae85ff8)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r4:dffe1dc0
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
 r4:84e0be80
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
 r5:85238000 r4:8291a680
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae05e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:ddde2d80 r6:83018200 r5:8527238c r4:84d53e00
 r10:61c88647 r9:85238000 r8:84d53e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d53e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d53e00 r8:80287e08 r7:eae79e60 r6:84d53e80 r5:85238000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae05fb0 to 0xeae05ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f63780
INFO: task kworker/1:389:4467 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e6264000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:390   state:D stack:0     pid:4470  tgid:4470  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae8de08
 r5:00001000 r4:eae53000
 r5:85272b8c r4:85272800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:84d53c80
dfa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eae91d84 r8:00000002 r7:60000113 r6:eae91d8c r5:8523a400
 r4:8523a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8523a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae91e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f63f40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8523a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaeb7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85273b8c r4:85273800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85273b8c r4:84d53f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8523a400 r8:84d53fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d53f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d53f80 r8:80287e08 r7:eae8de60 r6:84d53700 r5:8523a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae91fb0 to 0xeae91ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f63900
INFO: task kworker/1:391:4472 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e66e7000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fa0:                                     00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r4:8523b000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae99e08
 r4:00000000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:ddde2d80 r6:83018200 r5:85272f8c r4:84d80000
 r10:00000000 r9:84d80000 r8:80287e08 r7:eae91e60 r6:84d80180 r5:8523b000
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r4:dffe1dc0
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:393:4476 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:393   state:D stack:0     pid:4476  tgid:4476  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaea1d84 r8:00000002 r7:60000013 r6:eaea1d8c r5:8523bc00
 r4:8523bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8523bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f63c40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8523bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaea3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8527338c r4:85273000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8527338c r4:84d80080
 r10:61c88647 r9:8523bc00 r8:84d800ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fa0:                                     00000000 00000000 00000000 00000000
 r4:84f63b80
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:394:4478 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:394   state:D stack:0     pid:4478  tgid:4478  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaeb5d84 r8:00000002 r7:60000013 r6:eaeb5d8c r5:8523c800
 r4:8523c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8523c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f63dc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8523c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaea9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8527378c r4:85273400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8527378c r4:84d80100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8523c800 r8:84d8012c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d80100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d80100 r8:80287e08 r7:eae91e60 r6:84d80380 r5:8523c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaeb5fb0 to 0xeaeb5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f63d80
INFO: task kworker/1:394:4478 is blocked on a mutex likely owned by task kworker/0:123:3540.
Call trace: 
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:82ac21e4
 r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:395:4479 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:395   state:D stack:0     pid:4479  tgid:4479  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eadf9d84 r8:00000002 r7:60000013 r6:eadf9d8c r5:8523d400
 r4:8523d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8523d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d0a040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8523d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaebd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85273f8c r4:85273c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85273f8c r4:84d80200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8523d400 r8:84d8022c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d80200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d80200 r8:80287e08 r7:eae91e60 r6:84d80300 r5:8523d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadf9fb0 to 0xeadf9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f63d80
INFO: task kworker/1:395:4479 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:396:4482 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:396   state:D stack:0     pid:4482  tgid:4482  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaec1d84 r8:00000002 r7:60000113 r6:eaec1d8c r5:8523e000
 r4:8523e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8523e000 r4:8291a680
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8527c38c r4:8527c000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8527c38c r4:84d80400
 r10:61c88647 r9:8523e000 r8:84d8042c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r10:00000000 r9:84d80400 r8:80287e08 r7:eadf9e60 r6:84d80580 r5:8523e000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r4:82ac21e4
 r4:dffe1dc0
 r4:00000000
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:397:4485 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:397   state:D stack:0     pid:4485  tgid:4485  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaee1d84 r8:00000002 r7:60000013 r6:eaee1d8c r5:84f05400
 r4:84f05400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84f05400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d0a300
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84f05400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaed1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8527c78c r4:8527c400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8527c78c r4:84d80480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f05400 r8:84d804ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d80480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d80480 r8:80287e08 r7:eaec1e60 r6:84f67300 r5:84f05400
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e74a8000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
Workqueue: events bpf_prog_free_deferred
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:8527cb8c r4:8527c800
 r4:84d80600
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d0a280
INFO: task kworker/1:398:4486 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e785b000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84d87ac0
 r10:8291a684 r9:eaef5d84 r8:00000002 r7:60000113 r6:eaef5d8c r5:84f03000
 r4:00000000
 r5:8527cf8c r4:8527cc00
 r10:61c88647 r9:84f03000 r8:84d806ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
Workqueue: events bpf_prog_free_deferred
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:84e0be80
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r5:84f06c00 r4:8291a680
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r7:ddde2d80 r6:83018200 r5:8527d38c r4:84d80780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84f06c00 r8:84d807ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d80780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d80780 r8:80287e08 r7:eaef5e60 r6:84f67480 r5:84f06c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaefdfb0 to 0xeaefdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d0a5c0
INFO: task kworker/1:400:4490 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e7a61000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace: 
 r5:85260000 r4:8291a680
 r4:00000000
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8527d78c r4:8527d400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
dfa0:                                     00000000 00000000 00000000 00000000
Call trace: 
 r4:00000000
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r4:dffe1dc0
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
INFO: task kworker/1:402:4495 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:402   state:D stack:0     pid:4495  tgid:4495  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaec9d84 r8:00000002 r7:60000113 r6:eaec9d8c r5:85262400
 r4:85262400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85262400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d0ae40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85262400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf3b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8527db8c r4:8527d800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8527db8c r4:84d80700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85262400 r8:84d8072c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d80700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d80700 r8:80287e08 r7:eaedde60 r6:84d80980 r5:85262400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaec9fb0 to 0xeaec9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d0a900
INFO: task kworker/1:402:4495 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
task:kworker/0:285   state:D stack:0     pid:4498  tgid:4498  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf55e08
 r9:83018005 r8:85263c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
 r5:842ebb8c r4:842eb800
 r10:61c88647 r9:85263c00 r8:84f6752c r7:82804d40 r6:dddced80 r5:dddceda0
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r4:00000000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:286:4499 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:286   state:D stack:0     pid:4499  tgid:4499  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaf51d84 r8:00000002 r7:60000113 r6:eaf51d8c r5:85263000
 r4:85263000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85263000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf51e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8458ea80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85263000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead99000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8466878c r4:84668400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8466878c r4:84f67600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85263000 r8:84f6762c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84f67600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f67600 r8:80287e08 r7:eaf55e60 r6:84d80c00 r5:85263000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf51fb0 to 0xeaf51ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8458e040
INFO: task kworker/0:286:4499 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e8364000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:403:4500 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:403   state:D stack:0     pid:4500  tgid:4500  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaf61d84 r8:00000002 r7:60000113 r6:eaf61d8c r5:85264800
 r4:85264800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85264800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf61e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:00001000 r4:dfd4f000
 r5:8527e78c r4:8527e400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:85264800 r8:84d80aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:82ac21e4
 r4:dffe1dc0
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
 r4:85266000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
 r5:8527df8c r4:8527dc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fa0:                                     00000000 00000000 00000000 00000000
 r4:84e17100
INFO: task kworker/1:404:4503 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e88e8000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:405:4505 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:405   state:D stack:0     pid:4505  tgid:4505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ead85d84 r8:00000002 r7:60000013 r6:ead85d8c r5:85261800
 r4:85261800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85261800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r4:00000000
 r4:00000000
 r5:00001000 r4:dfa0d000
 r5:8527e38c r4:8527e000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:84d80c80 r8:80287e08 r7:eaf61e60 r6:84d80e80 r5:85261800
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eada1d84 r8:00000002 r7:60000013 r6:eada1d8c r5:8523ec00
 r4:8523ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8523ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e176c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8523ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe9b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8527eb8c r4:8527e800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8527eb8c r4:84d80d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8523ec00 r8:84d80d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d80d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d80d00 r8:80287e08 r7:eaf61e60 r6:84d80f80 r5:8523ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeada1fb0 to 0xeada1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e17480
INFO: task kworker/1:406:4506 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e8c67000 eca77000 00000001 80239b98 7f035000 00000001
 r4:dffe1dc0
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
 r5:85238c00 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8527ef8c r4:84d80f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85238c00 r8:84d80f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d80f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d80f00 r8:80287e08 r7:eada1e60 r6:84d80e00 r5:85238c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf6dfb0 to 0xeaf6dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e17680
INFO: task kworker/1:407:4510 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:8291a684 r9:eaf29d84 r8:00000002 r7:60000013 r6:eaf29d8c r5:85266c00
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf29e08
 r9:83018205 r8:85266c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
 r5:8527f38c r4:8527f000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:409:4513 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:409   state:D stack:0     pid:4513  tgid:4513  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaf35d84 r8:00000002 r7:60000113 r6:eaf35d8c r5:85265400
 r4:85265400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85265400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf35e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e17ac0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85265400 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e066d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8527f78c r4:8527f400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8527f78c r4:84de8100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85265400 r8:84de812c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84de8100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84de8100 r8:80287e08 r7:eaf29e60 r6:84de8280 r5:85265400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf35fb0 to 0xeaf35ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e17840
INFO: task kworker/1:409:4513 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e9284000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
 r5:8527fb8c r4:8527f800
 r7:ddde2d80 r6:83018200 r5:8527fb8c r4:84de8180
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
 r5:84688c00 r4:8291a680
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e17e40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84688c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e896b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8527ff8c r4:8527fc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8527ff8c r4:84de8200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84688c00 r8:84de822c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84de8200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84de8200 r8:80287e08 r7:eaf81e60 r6:84f67680 r5:84688c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf85fb0 to 0xeaf85ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e17c00
INFO: task kworker/1:411:4517 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e94e9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:412:4518 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:412   state:D stack:0     pid:4518  tgid:4518  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaf89d84 r8:00000002 r7:60000113 r6:eaf89d8c r5:84688000
 r4:84688000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84688000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf89e08
 r4:00000000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8528438c r4:85284000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:84de8300 r8:80287e08 r7:eaf85e60 r6:84f67580 r5:84688000
 r4:84e17e00
Workqueue: events bpf_prog_free_deferred
 r4:00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:00000000
 r5:00001000 r4:dfeb3000
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:413:4520 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:413   state:D stack:0     pid:4520  tgid:4520  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaf8dd84 r8:00000002 r7:60000013 r6:eaf8dd8c r5:8468a400
 r4:8468a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8468a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf8de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e173c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8468a400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea9b1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8528478c r4:85284400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8528478c r4:84de8500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8468a400 r8:84de852c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84de8500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84de8500 r8:80287e08 r7:eaf89e60 r6:84f67700 r5:8468a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d20:                   e9a23000 eca77000 00000001 80239b98 7f035000 00000001
 r4:dffe1dc0
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fa0:                                     00000000 00000000 00000000 00000000
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:414:4523 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:414   state:D stack:0     pid:4523  tgid:4523  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaf99d84 r8:00000002 r7:60000113 r6:eaf99d8c r5:8468c800
 r4:8468c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8468c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf99e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df3040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8468c800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea9dd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85284b8c r4:85284800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85284b8c r4:84de8400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8468c800 r8:84de842c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84de8400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84de8400 r8:80287e08 r7:eaf8de60 r6:84f67780 r5:8468c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf99fb0 to 0xeaf99ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e17fc0
INFO: task kworker/1:414:4523 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e9a23000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:415:4525 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:415   state:D stack:0     pid:4525  tgid:4525  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eafa5d84 r8:00000002 r7:60000113 r6:eafa5d8c r5:8468bc00
 r4:8468bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8468bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df3140
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8468bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa23000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85284f8c r4:85284c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85284f8c r4:84de8580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8468bc00 r8:84de85ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84de8580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84de8580 r8:80287e08 r7:eaf99e60 r6:84f67800 r5:8468bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafa5fb0 to 0xeafa5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84df3240
INFO: task kworker/1:415:4525 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   e9ed0000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:416:4527 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:416   state:D stack:0     pid:4527  tgid:4527  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eafa9d84 r8:00000002 r7:60000013 r6:eafa9d8c r5:8468b000
 r4:8468b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8468b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df3300
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8468b000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaabd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8528538c r4:85285000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8528538c r4:84de8480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8468b000 r8:84de84ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84de8480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84de8480 r8:80287e08 r7:eafa5e60 r6:84f67880 r5:8468b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafa9fb0 to 0xeafa9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84df3100
INFO: task kworker/1:416:4527 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ea045000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:417:4529 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:417   state:D stack:0     pid:4529  tgid:4529  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eafb1d84 r8:00000002 r7:60000013 r6:eafb1d8c r5:8468d400
 r4:8468d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8468d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r9:83018205 r8:8468d400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
 r7:ddde2d80 r6:83018200 r5:85285b8c r4:84de8680
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ea2e7000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:418:4530 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:418   state:D stack:0     pid:4530  tgid:4530  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaf7dd84 r8:00000002 r7:60000113 r6:eaf7dd8c r5:85268000
 r4:85268000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85268000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf7de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df3380
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85268000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8528578c r4:85285400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xeafb5fb0 to 0xeafb5ff8)
Workqueue: events bpf_prog_free_deferred
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r4:dffe1dc0
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
 r4:00000001
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:420:4536 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:420   state:D stack:0     pid:4536  tgid:4536  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eafb9d84 r8:00000002 r7:60000113 r6:eafb9d8c r5:8526b000
 r4:8526b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8526b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df3700
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8526b000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabef000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85285f8c r4:85285c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85285f8c r4:84de8800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8526b000 r8:84de882c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84de8800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84de8800 r8:80287e08 r7:eafb5e60 r6:84de8980 r5:8526b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafb9fb0 to 0xeafb9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84df3640
INFO: task kworker/1:420:4536 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   eadd6000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
 r4:00000000
 r9:83018205 r8:8526bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
 r7:ddde2d80 r6:83018200 r5:8528638c r4:84de8a00
 r4:00000001
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84df3640
INFO: task kworker/1:421:4537 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   eadd6000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r5:00001000 r4:dfeb3000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r5:8526c800 r4:8291a680
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df3a00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8526c800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac5d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8528678c r4:85286400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8528678c r4:84de8a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8526c800 r8:84de8aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84de8a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84de8a80 r8:80287e08 r7:eafb5e60 r6:84de8b80 r5:8526c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafc1fb0 to 0xeafc1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84df39c0
INFO: task kworker/1:422:4539 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018205 r8:8526d400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
 r7:ddde2d80 r6:83018200 r5:85286b8c r4:84de8c00
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:424   state:D stack:0     pid:4543  tgid:4543  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eafc9d84 r8:00000002 r7:60000113 r6:eafc9d8c r5:8526e000
 r4:8526e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8526e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df3cc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8526e000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac8f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85286f8c r4:85286c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85286f8c r4:84de8b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8526e000 r8:84de8b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84de8b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84de8b00 r8:80287e08 r7:eafb5e60 r6:84de8e00 r5:8526e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafc9fb0 to 0xeafc9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84df3c80
INFO: task kworker/1:424:4543 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   eb2d5000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
      Not tainted 6.15.0-rc6-syzkaller #0
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df3f80
 r5:8528778c r4:85287400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r4:00000000
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:84debf80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Workqueue: events bpf_prog_free_deferred
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:427:4548 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:427   state:D stack:0     pid:4548  tgid:4548  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaf91d84 r8:00000002 r7:60000113 r6:eaf91d8c r5:85240c00
 r4:85240c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85240c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf91e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850526c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85240c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadc5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8529038c r4:85290000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8529038c r4:84de8d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85240c00 r8:84de8dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84de8d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84de8d80 r8:80287e08 r7:eafd1e60 r6:84de8e80 r5:85240c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf91fb0 to 0xeaf91ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r4:00000000
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
INFO: task kworker/1:428:4550 blocked for more than 464 seconds.
 r4:85241800
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r5:00001000 r4:eadb9000
 r5:85287f8c r4:85287c00
 r4:84de8f80
Exception stack(0xeafd9fb0 to 0xeafd9ff8)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85052180
INFO: task kworker/1:428:4550 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ec0b8000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:287:4553 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:287   state:D stack:0     pid:4553  tgid:4553  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eafe5d84 r8:00000002 r7:60000113 r6:eafe5d8c r5:85242400
 r4:85242400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85242400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8458e440
 r9:83018005 r8:85242400 r7:00000000 r6:83018000 r5:00001000 r4:7f091000
 r5:8529078c r4:85290400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8529078c r4:84f67980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:84f67980
 r10:00000000 r9:84f67980 r8:80287e08 r7:eaf55e60 r6:85051000 r5:85242400
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:8458e440
Workqueue: events bpf_prog_free_deferred
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ec35f000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:429:4556 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:429   state:D stack:0     pid:4556  tgid:4556  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eafd5d84 r8:00000002 r7:60000113 r6:eafd5d8c r5:85243c00
 r4:85243c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85243c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85052cc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85243c00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf71000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85290f8c r4:85290c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85290f8c r4:85051180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85243c00 r8:850511ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85051180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85051180 r8:80287e08 r7:eaf91e60 r6:85051200 r5:85243c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafd5fb0 to 0xeafd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85052680
INFO: task kworker/1:429:4556 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ec35f000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:430:4559 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:430   state:D stack:0     pid:4559  tgid:4559  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eafedd84 r8:00000002 r7:60000113 r6:eafedd8c r5:85245400
 r4:85245400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85245400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafede08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85052b00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85245400 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eade3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85290b8c r4:85290800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85290b8c r4:85051100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85245400 r8:8505112c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85051100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85051100 r8:80287e08 r7:eafd5e60 r6:85051380 r5:85245400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafedfb0 to 0xeafedff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85052ac0
INFO: task kworker/1:430:4559 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ec941000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:431:4561 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:431   state:D stack:0     pid:4561  tgid:4561  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eafe9d84 r8:00000002 r7:60000113 r6:eafe9d8c r5:85244800
 r4:85244800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85244800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85052e00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85244800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaff3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8529138c r4:85291000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8529138c r4:85051280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85244800 r8:850512ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85051280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85051280 r8:80287e08 r7:eafd5e60 r6:85051480 r5:85244800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafe9fb0 to 0xeafe9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85052c80
INFO: task kworker/1:431:4561 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ec941000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:288:4562 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:288   state:D stack:0     pid:4562  tgid:4562  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaffdd84 r8:00000002 r7:60000113 r6:eaffdd8c r5:85246000
 r4:85246000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85246000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaffde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845743c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85246000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb1e9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:842eb78c r4:842eb400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:842eb78c r4:84f67a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85246000 r8:84f67a2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84f67a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84f67a00 r8:80287e08 r7:eaf55e60 r6:85051300 r5:85246000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaffdfb0 to 0xeaffdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84e03000
INFO: task kworker/0:288:4562 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ec941000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
 r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:432:4564 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:432   state:D stack:0     pid:4564  tgid:4564  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eafe1d84 r8:00000002 r7:60000113 r6:eafe1d8c r5:85246c00
 r4:85246c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85246c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85052780
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85246c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaff9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8529178c r4:85291400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8529178c r4:85051580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85246c00 r8:850515ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85051580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85051580 r8:80287e08 r7:eafe9e60 r6:85051400 r5:85246c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafe1fb0 to 0xeafe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85052d40
INFO: task kworker/1:432:4564 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   7f483000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 90070013 ffffffff
 r5:90070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb005d84 r8:00000002 r7:60000113 r6:eb005d8c r5:85240000
 r4:85240000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85240000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb005e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d8040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85240000 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
 r5:85291b8c r4:85291800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:850520c0
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r5:00001000 r4:dfa13000
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae81e08
 r5:00001000 r4:dfadb000
 r5:85291f8c r4:85291c00
 r4:85051600
Exception stack(0xeae81fb0 to 0xeae81ff8)
Workqueue: events bpf_prog_free_deferred
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:435   state:D stack:0     pid:4570  tgid:4570  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaeadd84 r8:00000002 r7:60000013 r6:eaeadd8c r5:8468ec00
 r4:8468ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8468ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeade08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d82c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8468ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfff1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8529238c r4:85292000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8529238c r4:85051780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8468ec00 r8:850517ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85051780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85051780 r8:80287e08 r7:eae81e60 r6:84f67b00 r5:8468ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaeadfb0 to 0xeaeadff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r5:85ef9f8c r4:85ef9c00
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:436:4572 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:436   state:D stack:0     pid:4572  tgid:4572  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb00dd84 r8:00000002 r7:60000113 r6:eb00dd8c r5:84398000
 r4:84398000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84398000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb00de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d8740
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84398000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e05fd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8529338c r4:85293000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8529338c r4:85051800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84398000 r8:8505182c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85051800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85051800 r8:80287e08 r7:eaeade60 r6:84f67b80 r5:84398000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb00dfb0 to 0xeb00dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847d8140
INFO: task kworker/1:436:4572 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   7fa10000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 90070013 ffffffff
 r5:90070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:437   state:D stack:0     pid:4573  tgid:4573  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
 r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:61c88647 r9:84398c00 r8:850518ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:82ac21e4
 r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:438:4575 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:438   state:D stack:0     pid:4575  tgid:4575  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb019d84 r8:00000002 r7:60000013 r6:eb019d8c r5:8439a400
 r4:8439a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8439a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb019e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d8580
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8439a400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e04f1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85292b8c r4:85292800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85292b8c r4:85051980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8439a400 r8:850519ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85051980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85051980 r8:80287e08 r7:eb00de60 r6:84f67c80 r5:8439a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb019fb0 to 0xeb019ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847d8340
INFO: task kworker/1:438:4575 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   7fd25000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 90070013 ffffffff
 r5:90070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:439:4577 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Workqueue: events bpf_prog_free_deferred
 r4:8439bc00
 r5:8439bc00 r4:8291a680
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb029e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d86c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8439bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e057f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85292f8c r4:85292c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85292f8c r4:85051a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8439bc00 r8:85051a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85051a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85051a00 r8:80287e08 r7:eb00de60 r6:84f67d00 r5:8439bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb029fb0 to 0xeb029ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847d8540
INFO: task kworker/1:439:4577 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   80111000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r5:8439b000 r4:8291a680
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb035e08
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r9:83018205 r8:8439b000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
 r5:8529378c r4:85293400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8529378c r4:85051a80
 r10:61c88647 r9:8439b000 r8:85051aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85051a80 r8:80287e08 r7:eb00de60 r6:84f67d80 r5:8439b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb035fb0 to 0xeb035ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847d88c0
INFO: task kworker/1:440:4580 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8049f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:441:4583 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:441   state:D stack:0     pid:4583  tgid:4583  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb041d84 r8:00000002 r7:60000113 r6:eb041d8c r5:8439c800
 r4:8439c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8439c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb041e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d8a40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8439c800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e07e3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85293b8c r4:85293800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85293b8c r4:85051b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8439c800 r8:85051b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85051b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85051b00 r8:80287e08 r7:eb035e60 r6:84f67e00 r5:8439c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb041fb0 to 0xeb041ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847d8940
INFO: task kworker/1:441:4583 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   80e4d000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:442:4584 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:442   state:D stack:0     pid:4584  tgid:4584  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb045d84 r8:00000002 r7:60000113 r6:eb045d8c r5:8439e000
 r4:8439e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8439e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb045e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505c4c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8439e000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae0f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85299b8c r4:85299800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85299b8c r4:85051900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8439e000 r8:8505192c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85051900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85051900 r8:80287e08 r7:eb041e60 r6:84f67e80 r5:8439e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb045fb0 to 0xeb045ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847d8940
INFO: task kworker/1:442:4584 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   80e4d000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:443:4586 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:443   state:D stack:0     pid:4586  tgid:4586  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb04dd84 r8:00000002 r7:60000113 r6:eb04dd8c r5:8439d400
 r4:8439d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8439d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb04de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d8c00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8439d400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e086c000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85293f8c r4:85293c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85293f8c r4:85051b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8439d400 r8:85051bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85051b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85051b80 r8:80287e08 r7:eb045e60 r6:84f67f00 r5:8439d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb04dfb0 to 0xeb04dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847d8c80
INFO: task kworker/1:443:4586 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   80e4d000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:444:4587 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:444   state:D stack:0     pid:4587  tgid:4587  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb051d84 r8:00000002 r7:60000113 r6:eb051d8c r5:84399800
 r4:84399800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84399800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb051e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d8d00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84399800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e8931000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8529838c r4:85298000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8529838c r4:85051c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84399800 r8:85051cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85051c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85051c80 r8:80287e08 r7:eb045e60 r6:84f67f80 r5:84399800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb051fb0 to 0xeb051ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847d8bc0
INFO: task kworker/1:444:4587 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   80e4d000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:445:4589 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:445   state:D stack:0     pid:4589  tgid:4589  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb059d84 r8:00000002 r7:60000013 r6:eb059d8c r5:8439ec00
 r4:8439ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8439ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb059e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d8ec0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8439ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab05000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8529878c r4:85298400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8529878c r4:85051d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8439ec00 r8:85051d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85051d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85051d00 r8:80287e08 r7:eb045e60 r6:8505e000 r5:8439ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb059fb0 to 0xeb059ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847d8f00
INFO: task kworker/1:445:4589 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   811b8000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:446:4591 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:446   state:D stack:0     pid:4591  tgid:4591  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb061d84 r8:00000002 r7:60000013 r6:eb061d8c r5:851e3000
 r4:851e3000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:851e3000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb061e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d8f80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:851e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab21000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85298b8c r4:85298800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85298b8c r4:85051d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:851e3000 r8:85051dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85051d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85051d80 r8:80287e08 r7:eb045e60 r6:8505e080 r5:851e3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb061fb0 to 0xeb061ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847d8fc0
INFO: task kworker/1:446:4591 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   81696000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:447:4593 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:447   state:D stack:0     pid:4593  tgid:4593  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb069d84 r8:00000002 r7:60000113 r6:eb069d8c r5:85248c00
 r4:85248c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85248c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb069e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505c000
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85248c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab8b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85298f8c r4:85298c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85298f8c r4:85051e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85248c00 r8:85051e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85051e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85051e00 r8:80287e08 r7:eb045e60 r6:8505e100 r5:85248c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb069fb0 to 0xeb069ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:844d7b00
INFO: task kworker/1:447:4593 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   81696000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:448:4595 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:448   state:D stack:0     pid:4595  tgid:4595  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eafddd84 r8:00000002 r7:60000013 r6:eafddd8c r5:85243000
 r4:85243000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85243000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafdde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505c140
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:8529938c r4:85299000
 r7:ddde2d80 r6:83018200 r5:8529938c r4:85051680
 r10:00000000 r9:85051680 r8:80287e08 r7:eb045e60 r6:85051e80 r5:85243000
 r4:8505c240
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:450:4600 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:450   state:D stack:0     pid:4600  tgid:4600  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb075d84 r8:00000002 r7:60000013 r6:eb075d8c r5:85250c00
 r4:85250c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85250c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb075e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505c900
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85250c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae2b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8529a38c r4:8529a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8529a38c r4:85063080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85250c00 r8:850630ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85063080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85063080 r8:80287e08 r7:eb045e60 r6:85063000 r5:85250c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb075fb0 to 0xeb075ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8505c080
INFO: task kworker/1:450:4600 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   81e84000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
 r5:85253000 r4:8291a680
 r4:00000000
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:85063100
Exception stack(0xeb079fb0 to 0xeb079ff8)
 r4:8505c6c0
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:82ac21e4
 r4:dffe1dc0
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:452:4604 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:452   state:D stack:0     pid:4604  tgid:4604  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eae31d84 r8:00000002 r7:60000013 r6:eae31d8c r5:85253c00
 r4:85253c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85253c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae31e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505cb00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85253c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae47000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8529a78c r4:8529a400
 r7:ddde2d80 r6:83018200 r5:8529a78c r4:85063180
Exception stack(0xeae31fb0 to 0xeae31ff8)
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:00001000 r4:eae51000
 r5:8529ab8c r4:8529a800
 r10:61c88647 r9:8524a400 r8:8506322c r7:82804d40 r6:ddde2d80 r5:ddde2da0
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r4:82ac21e4
 r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:454:4608 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:454   state:D stack:0     pid:4608  tgid:4608  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb08dd84 r8:00000002 r7:60000013 r6:eb08dd8c r5:8524bc00
 r4:8524bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8524bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb08de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505cd40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8524bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae5d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8529af8c r4:8529ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8529af8c r4:85063400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8524bc00 r8:8506342c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85063400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85063400 r8:80287e08 r7:eb085e60 r6:8505e200 r5:8524bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb08dfb0 to 0xeb08dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8505cbc0
INFO: task kworker/1:454:4608 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   827ad000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:455:4610 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:455   state:D stack:0     pid:4610  tgid:4610  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb091d84 r8:00000002 r7:60000013 r6:eb091d8c r5:85249800
 r4:85249800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85249800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb091e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85061040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85249800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae89000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8529b78c r4:8529b400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8529b78c r4:85063480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85249800 r8:850634ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85063480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85063480 r8:80287e08 r7:eb08de60 r6:8505e280 r5:85249800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb091fb0 to 0xeb091ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8505cc80
INFO: task kworker/1:455:4610 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   827ad000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r5:8529b38c r4:8529b000
 r10:61c88647 r9:8524c800 r8:850635ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
      Not tainted 6.15.0-rc6-syzkaller #0
 r4:8524ec00
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85061140
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8524ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaea7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8529bb8c r4:8529b800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8529bb8c r4:85063300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8524ec00 r8:8506332c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85063300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85063300 r8:80287e08 r7:eb091e60 r6:8505e380 r5:8524ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0a1fb0 to 0xeb0a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85061240
INFO: task kworker/1:457:4615 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   82d35000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:458:4616 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:458   state:D stack:0     pid:4616  tgid:4616  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb0a9d84 r8:00000002 r7:60000013 r6:eb0a9d8c r5:85248000
 r4:85248000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85248000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850612c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85248000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaeb9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8529bf8c r4:8529bc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8529bf8c r4:85063500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85248000 r8:8506352c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85063500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85063500 r8:80287e08 r7:eb0a1e60 r6:8505e400 r5:85248000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0a9fb0 to 0xeb0a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:850613c0
INFO: task kworker/1:458:4616 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   82d35000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r5:00001000 r4:eaec5000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Exception stack(0xeb0b1fb0 to 0xeb0b1ff8)
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:80070013 r4:80239bb0
 r4:dffe1dc0
 r5:00001000 r4:dfa13000
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
INFO: task kworker/1:460:4620 blocked for more than 464 seconds.
 r4:8524e000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b5e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8529c78c r4:8529c400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8529c78c r4:85063780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8524e000 r8:850637ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85063780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85063780 r8:80287e08 r7:eb0b1e60 r6:8505e500 r5:8524e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0b5fb0 to 0xeb0b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85061340
INFO: task kworker/1:460:4620 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   82f4c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:461:4622 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:461   state:D stack:0     pid:4622  tgid:4622  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb0b9d84 r8:00000002 r7:60000113 r6:eb0b9d8c r5:8524b000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:462:4624 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:462   state:D stack:0     pid:4624  tgid:4624  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:8524d400 r8:850638ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8320d000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
 r4:852c8c00
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c5e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85061c40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:852c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf5d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8529db8c r4:8529d800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8529db8c r4:85063980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:852c8c00 r8:850639ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85063980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85063980 r8:80287e08 r7:eb0bde60 r6:8505e680 r5:852c8c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0c5fb0 to 0xeb0c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85061880
INFO: task kworker/1:463:4626 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:8291a684 r9:eb0d1d84 r8:00000002 r7:60000013 r6:eb0d1d8c r5:852c8000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:00001000 r4:eaf37000
 r5:8529d78c r4:8529d400
 r10:61c88647 r9:852c8000 r8:85063b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   83a94000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:466:4631 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:466   state:D stack:0     pid:4631  tgid:4631  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb0d9d84 r8:00000002 r7:60000113 r6:eb0d9d8c r5:852cbc00
 r4:852cbc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:852cbc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f9180
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r5:00001000 r4:dfa13000
 r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
 r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8529df8c r4:8529dc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8529df8c r4:85063c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:852cb000 r8:85063c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85063c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85063c00 r8:80287e08 r7:eb0d9e60 r6:8505e880 r5:852cb000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0e5fb0 to 0xeb0e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85061c00
INFO: task kworker/1:467:4633 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   83f71000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
 r5:00001000 r4:dfa13000
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
      Not tainted 6.15.0-rc6-syzkaller #0
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85061e40
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8458ec00
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:470:4639 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:470   state:D stack:0     pid:4639  tgid:4639  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb109d84 r8:00000002 r7:60000113 r6:eb109d8c r5:852cec00
 r4:852cec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:852cec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb109e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e035c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:852cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb101000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8529eb8c r4:8529e800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8529eb8c r4:85063900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:852cec00 r8:8506392c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85063900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85063900 r8:80287e08 r7:eb0d9e60 r6:8505ea00 r5:852cec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb109fb0 to 0xeb109ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85061840
INFO: task kworker/1:470:4639 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   841a8000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:471:4641 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:471   state:D stack:0     pid:4641  tgid:4641  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb11dd84 r8:00000002 r7:60000113 r6:eb11dd8c r5:852d0000
 r4:852d0000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:852d0000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb11de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505c380
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:852d0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb113000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8529ef8c r4:8529ec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8529ef8c r4:85063d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:852d0000 r8:85063d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85063d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85063d00 r8:80287e08 r7:eb0d9e60 r6:8505ea80 r5:852d0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb11dfb0 to 0xeb11dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r5:00001000 r4:dfa13000
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
 r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
 r5:852d3000 r4:8291a680
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb139e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8529fb8c r4:8529f800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8529fb8c r4:85063e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:852d3000 r8:85063e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85063e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85063e00 r8:80287e08 r7:eb0d9e60 r6:8505eb80 r5:852d3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb139fb0 to 0xeb139ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852f9280
INFO: task kworker/1:473:4645 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   847e6000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
INFO: task kworker/1:474:4647 blocked for more than 465 seconds.
 r5:852d2400 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:852d2400 r8:85063eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
1d20:                   84a9c000 dfeb5000 00000001 80239b98 7f081000 00000001
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r5:00001000 r4:dfa21000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:85063d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85063d80 r8:80287e08 r7:eb141e60 r6:8505ec80 r5:852d4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb14dfb0 to 0xeb14dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852f92c0
INFO: task kworker/1:475:4649 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   84c6f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:476:4651 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:476   state:D stack:0     pid:4651  tgid:4651  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb15dd84 r8:00000002 r7:60000013 r6:eb15dd8c r5:852d3c00
 r4:852d3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:852d3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb15de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f9580
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:852d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb155000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852a038c r4:852a0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852a038c r4:85051c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:852d3c00 r8:85051c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85051c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85051c00 r8:80287e08 r7:eb14de60 r6:8505ed00 r5:852d3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb15dfb0 to 0xeb15dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852f9440
INFO: task kworker/1:476:4651 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   84df1000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:477:4653 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:477   state:D stack:0     pid:4653  tgid:4653  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb07dd84 r8:00000002 r7:60000113 r6:eb07dd8c r5:85252400
 r4:85252400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85252400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb07de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f96c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85252400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb167000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852a078c r4:852a0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852a078c r4:85051f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
1d20:                   851b8000 dfeb5000 00000001 80239b98 7f081000 00000001
 r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
 r4:84d87ac0
task:kworker/1:478   state:D stack:0     pid:4656  tgid:4656  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f9840
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xeb171fb0 to 0xeb171ff8)
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:80070013 r4:80239bb0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e8000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0119000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852a1b8c r4:852a1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852a1b8c r4:85307100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85256c00 r8:8530712c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85307100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85307100 r8:80287e08 r7:eb14de60 r6:85307180 r5:85256c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeada5fb0 to 0xeada5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852f9a80
INFO: task kworker/1:479:4659 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   85618000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:84d87ac0
task:kworker/1:480   state:D stack:0     pid:4660  tgid:4660  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb081e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d20:                   85bcc000 dfeb5000 00000001 80239b98 7f081000 00000001
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r5:00001000 r4:dfa13000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:481:4661 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:481   state:D stack:0     pid:4661  tgid:4661  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb17dd84 r8:00000002 r7:60000113 r6:eb17dd8c r5:85254800
 r4:85254800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85254800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb17de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f9c40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85254800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff97000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r7:ddde2d80 r6:83018200 r5:852a178c r4:85307300
 r4:00000001
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:852a238c r4:852a2000
 r4:85307400
Exception stack(0xeb179fb0 to 0xeb179ff8)
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fa0:                                     00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:483:4666 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:483   state:D stack:0     pid:4666  tgid:4666  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb185d84 r8:00000002 r7:60000013 r6:eb185d8c r5:85259800
 r4:85259800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85259800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb185e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f9f00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85259800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e48ab000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852a1f8c r4:852a1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852a1f8c r4:85307600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85259800 r8:8530762c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85307600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85307600 r8:80287e08 r7:eb179e60 r6:85307580 r5:85259800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb185fb0 to 0xeb185ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852e8180
INFO: task kworker/1:483:4666 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   863c1000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
      Not tainted 6.15.0-rc6-syzkaller #0
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb189d84 r8:00000002 r7:60000113 r6:eb189d8c r5:8525a400
 r4:8525a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8525a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb189e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84574200
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8525a400 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e8971000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84668f8c r4:84668c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84668f8c r4:85307480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8525a400 r8:853074ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85307480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85307480 r8:80287e08 r7:eb179e60 r6:85307680 r5:8525a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb189fb0 to 0xeb189ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845741c0
INFO: task kworker/1:484:4667 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r4:00000000
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r4:00000001
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:485:4670 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:485   state:D stack:0     pid:4670  tgid:4670  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb181d84 r8:00000002 r7:60000013 r6:eb181d8c r5:85258c00
 r4:85258c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85258c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:00001000 r4:eaa03000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:85307700
Exception stack(0xeb181fb0 to 0xeb181ff8)
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r5:00001000 r4:dfa13000
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
      Not tainted 6.15.0-rc6-syzkaller #0
 r4:8525bc00
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb18de08
 r5:00001000 r4:eaabb000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
INFO: task kworker/1:487:4674 blocked for more than 465 seconds.
 r4:8525c800
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac3f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84668b8c r4:84668800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84668b8c r4:85307980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8525c800 r8:853079ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85307980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85307980 r8:80287e08 r7:eb18de60 r6:85307a80 r5:8525c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb195fb0 to 0xeb195ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e200
INFO: task kworker/1:487:4674 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   86a1a000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:488:4676 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:488   state:D stack:0     pid:4676  tgid:4676  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb191d84 r8:00000002 r7:60000113 r6:eb191d8c r5:8525e000
 r4:8525e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8525e000 r4:8291a680
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:8525e000 r8:8530782c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:82ac21e4
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:489:4677 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:489   state:D stack:0     pid:4677  tgid:4677  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb19dd84 r8:00000002 r7:60000013 r6:eb19dd8c r5:8525ec00
 r4:8525ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8525ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb19de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8530e700
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8525ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabe7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852a338c r4:852a3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852a338c r4:85307a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8525ec00 r8:85307a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85307a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85307a00 r8:80287e08 r7:eb195e60 r6:8505ee00 r5:8525ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb19dfb0 to 0xeb19dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e580
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:80070013 r4:80239bb0
 r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
task:kworker/1:490   state:D stack:0     pid:4680  tgid:4680  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8530eb40
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:852d6000 r8:85307b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85307b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85307b00 r8:80287e08 r7:eb195e60 r6:8505ee80 r5:852d6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1a5fb0 to 0xeb1a5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530eac0
INFO: task kworker/1:490:4680 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   872ef000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:8291a684 r9:eb1add84 r8:00000002 r7:60000013 r6:eb1add8c r5:852d0c00
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852a378c r4:852a3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852a378c r4:85307c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:852d0c00 r8:85307c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85307c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85307c00 r8:80287e08 r7:eb1a5e60 r6:8505ed80 r5:852d0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1adfb0 to 0xeb1adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e980
INFO: task kworker/1:491:4682 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8756b000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r5:00001000 r4:dfa13000
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r4:dffe1dc0
 r5:00001000 r4:dfa13000
 r4:84e0be80
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r5:852cd400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1bde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8530ebc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:852cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead2d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852a3f8c r4:852a3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852a3f8c r4:85307d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:852cd400 r8:85307dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85307d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85307d80 r8:80287e08 r7:eb1b5e60 r6:8505ef80 r5:852cd400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1bdfb0 to 0xeb1bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530eb00
INFO: task kworker/1:493:4686 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   87c8d000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r5:00001000 r4:dfa13000
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:82ac21e4
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
task:kworker/1:495   state:D stack:0     pid:4689  tgid:4689  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:85307f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85307f80 r8:80287e08 r7:eb1b5e60 r6:8535d080 r5:85251800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1c9fb0 to 0xeb1c9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530ee00
INFO: task kworker/1:495:4689 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   881f5000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/1:496:4692 blocked for more than 465 seconds.
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85390f8c r4:85390c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85390f8c r4:85063b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853c8000 r8:85063bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85063b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85063b80 r8:80287e08 r7:eb1b5e60 r6:8535d180 r5:853c8000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1d9fb0 to 0xeb1d9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8535e240
INFO: task kworker/1:497:4693 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   882c4000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:498:4696 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:498   state:D stack:0     pid:4696  tgid:4696  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb1e5d84 r8:00000002 r7:60000013 r6:eb1e5d8c r5:853c8c00
 r4:853c8c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535e380
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r5:00001000 r4:dfa13000
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:499:4698 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:499   state:D stack:0     pid:4698  tgid:4698  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb1edd84 r8:00000002 r7:60000013 r6:eb1edd8c r5:853cb000
 r4:853cb000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853cb000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1ede08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535e6c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaff7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85391f8c r4:85391c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85391f8c r4:85362080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853cb000 r8:853620ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85362080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85362080 r8:80287e08 r7:eb1e5e60 r6:8535d580 r5:853cb000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1edfb0 to 0xeb1edff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:500:4699 blocked for more than 465 seconds.
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535e580
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:00000000
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fa0:                                     00000000 00000000 00000000 00000000
task:kworker/1:501   state:D stack:0     pid:4701  tgid:4701  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535eac0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb217000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85392b8c r4:85392800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85392b8c r4:85362100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853ca400 r8:8536212c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85362100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85362100 r8:80287e08 r7:eb1ede60 r6:8535d200 r5:853ca400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1f9fb0 to 0xeb1f9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8535e540
INFO: task kworker/1:501:4701 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   889a3000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:502   state:D stack:0     pid:4703  tgid:4703  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb209e08
 r5:00001000 r4:eb1ff000
 r5:8539238c r4:85392000
 r4:85362280
9fa0:                                     00000000 00000000 00000000 00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r5:00001000 r4:dfa13000
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018205 r8:853cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
 r5:8539278c r4:85392400
 r4:85362380
Exception stack(0xeb215fb0 to 0xeb215ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8535ea00
INFO: task kworker/1:503:4706 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   88e5c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:504:4708 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:504   state:D stack:0     pid:4708  tgid:4708  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb221d84 r8:00000002 r7:60000113 r6:eb221d8c r5:853cec00
 r4:853cec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853cec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb221e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535ec40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb21d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85392f8c r4:85392c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85392f8c r4:85362400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853cec00 r8:8536242c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8535ea80
INFO: task kworker/1:504:4708 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   88e5c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r5:00001000 r4:dfa13000
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r4:84e0be80
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
task:kworker/1:505   state:D stack:0     pid:4710  tgid:4710  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535edc0
 r5:8539338c r4:85393000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xeb229fb0 to 0xeb229ff8)
 r4:8535ec00
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   89295000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:506:4712 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:506   state:D stack:0     pid:4712  tgid:4712  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb235d84 r8:00000002 r7:60000113 r6:eb235d8c r5:852d6c00
 r4:852d6c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:852d6c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb235e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:8539378c r4:85393400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:85362500
Exception stack(0xeb235fb0 to 0xeb235ff8)
 r4:8535ed80
Workqueue: events bpf_prog_free_deferred
 r4:00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r4:dffe1dc0
 r4:00000000
 r5:85ef9f8c r4:85ef9c00
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8291a684 r9:eb249d84 r8:00000002 r7:60000013 r6:eb249d8c r5:84d40000
 r4:84d40000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d40000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb249e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85304d80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d40000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb23b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85393b8c r4:85393800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85393b8c r4:85362580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d40000 r8:853625ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85362580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85362580 r8:80287e08 r7:eb235e60 r6:8535d680 r5:84d40000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb249fb0 to 0xeb249ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8535ee40
INFO: task kworker/1:507:4714 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   89561000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:508:4716 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:508   state:D stack:0     pid:4716  tgid:4716  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb251d84 r8:00000002 r7:60000013 r6:eb251d8c r5:84d40c00
 r4:84d40c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d40c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb251e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535ea40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d40c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb241000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85393f8c r4:85393c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85393f8c r4:85362600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d40c00 r8:8536262c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85362600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85362600 r8:80287e08 r7:eb249e60 r6:8535d700 r5:84d40c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb251fb0 to 0xeb251ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852f9f80
INFO: task kworker/1:508:4716 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   89956000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:509:4719 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:509   state:D stack:0     pid:4719  tgid:4719  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb199d84 r8:00000002 r7:60000113 r6:eb199d8c r5:84d41800
 r4:84d41800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d41800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb199e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536e100
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d41800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb259000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8539438c r4:85394000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8539438c r4:85362180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d41800 r8:853621ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85362180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85362180 r8:80287e08 r7:eb251e60 r6:8535d780 r5:84d41800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb199fb0 to 0xeb199ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8535e740
INFO: task kworker/1:509:4719 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   89956000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:510:4721 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:510   state:D stack:0     pid:4721  tgid:4721  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb265d84 r8:00000002 r7:60000113 r6:eb265d8c r5:84d43000
 r4:84d43000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d43000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb265e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536e240
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d43000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb267000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8539478c r4:85394400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8539478c r4:85362680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d43000 r8:853626ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85362680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85362680 r8:80287e08 r7:eb199e60 r6:8535d900 r5:84d43000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb265fb0 to 0xeb265ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8536e0c0
INFO: task kworker/1:510:4721 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   89956000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:511:4723 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:511   state:D stack:0     pid:4723  tgid:4723  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb275d84 r8:00000002 r7:60000113 r6:eb275d8c r5:84d44800
 r4:84d44800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d44800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb275e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536e680
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d44800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb289000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8539538c r4:85395000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8539538c r4:85362780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d44800 r8:853627ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85362780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85362780 r8:80287e08 r7:eb265e60 r6:8535d800 r5:84d44800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb275fb0 to 0xeb275ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8536e180
INFO: task kworker/1:511:4723 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8a093000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:512:4724 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:512   state:D stack:0     pid:4724  tgid:4724  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb27dd84 r8:00000002 r7:60000013 r6:eb27dd8c r5:84d42400
 r4:84d42400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d42400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb27de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536e3c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d42400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb26d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85394b8c r4:85394800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85394b8c r4:85362700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d42400 r8:8536272c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85362700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85362700 r8:80287e08 r7:eb275e60 r6:8535d880 r5:84d42400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb27dfb0 to 0xeb27dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8536e4c0
INFO: task kworker/1:512:4724 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8a093000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:513:4727 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:513   state:D stack:0     pid:4727  tgid:4727  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb291d84 r8:00000002 r7:60000113 r6:eb291d8c r5:84d46000
 r4:84d46000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d46000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb291e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536e500
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d46000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb283000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85394f8c r4:85394c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85394f8c r4:85362800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d46000 r8:8536282c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85362800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85362800 r8:80287e08 r7:eb275e60 r6:8535d980 r5:84d46000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb291fb0 to 0xeb291ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8536e380
INFO: task kworker/1:513:4727 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8a093000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:514:4728 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:514   state:D stack:0     pid:4728  tgid:4728  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb295d84 r8:00000002 r7:60000013 r6:eb295d8c r5:84d45400
 r4:84d45400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d45400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb295e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536e700
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d45400 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2a3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8539578c r4:85395400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8539578c r4:85362880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d45400 r8:853628ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85362880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85362880 r8:80287e08 r7:eb275e60 r6:8535da00 r5:84d45400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb295fb0 to 0xeb295ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8536e440
INFO: task kworker/1:514:4728 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8a093000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:515:4730 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:515   state:D stack:0     pid:4730  tgid:4730  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb2a1d84 r8:00000002 r7:60000113 r6:eb2a1d8c r5:84d43c00
 r4:84d43c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d43c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536ec40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d43c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2bd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8539638c r4:85396000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8539638c r4:85362900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d43c00 r8:8536292c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85362900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85362900 r8:80287e08 r7:eb295e60 r6:8535da80 r5:84d43c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2a1fb0 to 0xeb2a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8536e640
INFO: task kworker/1:515:4730 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8a90a000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:516:4732 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:516   state:D stack:0     pid:4732  tgid:4732  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb20dd84 r8:00000002 r7:60000113 r6:eb20dd8c r5:847e8000
 r4:847e8000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:847e8000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb20de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536e8c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:847e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2a9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85395b8c r4:85395800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85395b8c r4:85362a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:847e8000 r8:85362a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85362a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85362a00 r8:80287e08 r7:eb2a1e60 r6:85362980 r5:847e8000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb20dfb0 to 0xeb20dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8536e740
INFO: task kworker/1:516:4732 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8a90a000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:517:4735 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:517   state:D stack:0     pid:4735  tgid:4735  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb2add84 r8:00000002 r7:60000113 r6:eb2add8c r5:847e8c00
 r4:847e8c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:847e8c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ade08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536ea00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:847e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2b7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85395f8c r4:85395c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85395f8c r4:85362a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:847e8c00 r8:85362aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85362a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85362a80 r8:80287e08 r7:eb2a1e60 r6:85362b80 r5:847e8c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2adfb0 to 0xeb2adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8536e940
INFO: task kworker/1:517:4735 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8a90a000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:518:4736 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:518   state:D stack:0     pid:4736  tgid:4736  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb1a1d84 r8:00000002 r7:60000113 r6:eb1a1d8c r5:847ea400
 r4:847ea400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:847ea400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536ed00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:847ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2c7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8539678c r4:85396400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8539678c r4:85362300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:847ea400 r8:8536232c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85362300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85362300 r8:80287e08 r7:eb2a1e60 r6:85362b00 r5:847ea400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1a1fb0 to 0xeb1a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8536e940
INFO: task kworker/1:518:4736 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8acce000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:519:4739 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:519   state:D stack:0     pid:4739  tgid:4739  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb2c1d84 r8:00000002 r7:60000113 r6:eb2c1d8c r5:847eb000
 r4:847eb000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:847eb000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536ee80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:847eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2d7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85396b8c r4:85396800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85396b8c r4:85362c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:847eb000 r8:85362c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85362c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85362c00 r8:80287e08 r7:eb1a1e60 r6:85362d00 r5:847eb000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2c1fb0 to 0xeb2c1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8536ed40
INFO: task kworker/1:519:4739 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8acce000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:520:4741 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:520   state:D stack:0     pid:4741  tgid:4741  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb2e9d84 r8:00000002 r7:60000113 r6:eb2e9d8c r5:853d0000
 r4:853d0000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853d0000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85381200
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853d0000 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa07000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8539778c r4:85397400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8539778c r4:85362d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853d0000 r8:85362dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85362d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85362d80 r8:80287e08 r7:eb2c1e60 r6:8535db00 r5:853d0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2e9fb0 to 0xeb2e9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8536ee40
INFO: task kworker/1:520:4741 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8b2c4000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:521:4743 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:521   state:D stack:0     pid:4743  tgid:4743  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb2f5d84 r8:00000002 r7:60000013 r6:eb2f5d8c r5:853d0c00
 r4:853d0c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853d0c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536efc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2dd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85396f8c r4:85396c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85396f8c r4:85362e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853d0c00 r8:85362e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85362e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85362e00 r8:80287e08 r7:eb2e9e60 r6:8535db80 r5:853d0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2f5fb0 to 0xeb2f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8536a8c0
INFO: task kworker/1:521:4743 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8b2c4000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:522:4744 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:522   state:D stack:0     pid:4744  tgid:4744  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb2fdd84 r8:00000002 r7:60000113 r6:eb2fdd8c r5:853d2400
 r4:853d2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853d2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2fde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85381000
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2ef000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8539738c r4:85397000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8539738c r4:85362e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853d2400 r8:85362eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85362e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85362e80 r8:80287e08 r7:eb2e9e60 r6:8535dc00 r5:853d2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2fdfb0 to 0xeb2fdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853810c0
INFO: task kworker/1:522:4744 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8b5c1000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:523:4747 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:523   state:D stack:0     pid:4747  tgid:4747  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb039d84 r8:00000002 r7:60000113 r6:eb039d8c r5:853d3c00
 r4:853d3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853d3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb039e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85381340
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfce3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85397b8c r4:85397800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85397b8c r4:85063f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853d3c00 r8:85063fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85063f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85063f80 r8:80287e08 r7:eb2e9e60 r6:8535dc80 r5:853d3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb039fb0 to 0xeb039ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853811c0
INFO: task kworker/1:523:4747 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8bab2000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:524:4748 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:524   state:D stack:0     pid:4748  tgid:4748  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb099d84 r8:00000002 r7:60000013 r6:eb099d8c r5:853d4800
 r4:853d4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853d4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb099e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85381480
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e005f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85397f8c r4:85397c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85397f8c r4:85362f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853d4800 r8:85362fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85362f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85362f80 r8:80287e08 r7:eb039e60 r6:8535dd00 r5:853d4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb099fb0 to 0xeb099ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853811c0
INFO: task kworker/1:524:4748 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8bf43000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:525:4751 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:525   state:D stack:0     pid:4751  tgid:4751  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb10dd84 r8:00000002 r7:60000113 r6:eb10dd8c r5:853d3000
 r4:853d3000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853d3000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb10de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853815c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0513000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8539838c r4:85398000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8539838c r4:85362f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853d3000 r8:85362f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85362f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85362f00 r8:80287e08 r7:eb099e60 r6:8535dd80 r5:853d3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb10dfb0 to 0xeb10dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85381280
INFO: task kworker/1:525:4751 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8bf43000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:526:4753 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:526   state:D stack:0     pid:4753  tgid:4753  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb121d84 r8:00000002 r7:60000013 r6:eb121d8c r5:853d5400
 r4:853d5400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853d5400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb121e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85381780
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e05fb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8539878c r4:85398400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8539878c r4:8504b000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853d5400 r8:8504b02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8504b000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8504b000 r8:80287e08 r7:eb10de60 r6:8535de00 r5:853d5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb121fb0 to 0xeb121ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85381500
INFO: task kworker/1:526:4753 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8bf43000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:527:4755 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:527   state:D stack:0     pid:4755  tgid:4755  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb145d84 r8:00000002 r7:60000113 r6:eb145d8c r5:853d6c00
 r4:853d6c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853d6c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb145e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853818c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0715000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85398b8c r4:85398800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85398b8c r4:8504b080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853d6c00 r8:8504b0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8504b080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8504b080 r8:80287e08 r7:eb121e60 r6:8535de80 r5:853d6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb145fb0 to 0xeb145ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853813c0
INFO: task kworker/1:527:4755 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:528:4757 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
 r5:85398f8c r4:85398c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:853d6000 r8:8504b22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r4:82ac21e4
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:529   state:D stack:0     pid:4759  tgid:4759  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85381c00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853d1800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab1f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8539978c r4:85399400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8539978c r4:8504b280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853d1800 r8:8504b2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8504b280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8504b280 r8:80287e08 r7:eb301e60 r6:8535df80 r5:853d1800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb309fb0 to 0xeb309ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85381940
INFO: task kworker/1:529:4759 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8c85e000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
 r5:85ef9f8c r4:85ef9c00
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:847ec800
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e9e08
 r4:00000000
 r5:8539938c r4:85399000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:847ec800 r8:8504b32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:00000000
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
 r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
 r5:847ee000 r4:8291a680
 r4:00000000
 r4:00000000
 r5:85399b8c r4:85399800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:8504b100 r8:80287e08 r7:eb309e60 r6:8504b180 r5:847ee000
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8cb15000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:532:4766 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:532   state:D stack:0     pid:4766  tgid:4766  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb315d84 r8:00000002 r7:60000113 r6:eb315d8c r5:847eec00
 r4:847eec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:847eec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb315e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85381ec0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:847eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eacf1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85399f8c r4:85399c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85399f8c r4:8504b400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:847eec00 r8:8504b42c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8504b400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536af00
 r5:8539a38c r4:8539a000
 r10:61c88647 r9:847ed400 r8:8504b52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:534:4768 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:534   state:D stack:0     pid:4768  tgid:4768  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb31dd84 r8:00000002 r7:60000113 r6:eb31dd8c r5:847ebc00
 r4:847ebc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:847ebc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb31de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85031000
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:847ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae25000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8539a78c r4:8539a400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8539a78c r4:8504b600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:847ebc00 r8:8504b62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8504b600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8504b600 r8:80287e08 r7:eb2d1e60 r6:8504b680 r5:847ebc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb31dfb0 to 0xeb31dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85381d40
INFO: task kworker/1:534:4768 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8d1f7000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r4:dffe1dc0
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
 r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
INFO: task kworker/1:535:4772 blocked for more than 466 seconds.
 r5:847e9800 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xeb319fb0 to 0xeb319ff8)
 r4:85031240
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:536:4773 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:536   state:D stack:0     pid:4773  tgid:4773  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb325d84 r8:00000002 r7:60000013 r6:eb325d8c r5:8525b000
 r4:8525b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8525b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb325e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85031540
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8525b000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae67000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8539b38c r4:8539b000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8539b38c r4:8504b800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8525b000 r8:8504b82c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8504b800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8504b800 r8:80287e08 r7:eb319e60 r6:8504b880 r5:8525b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb325fb0 to 0xeb325ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85031240
INFO: task kworker/1:536:4773 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8d7aa000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:537:4774 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:537   state:D stack:0     pid:4774  tgid:4774  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb321d84 r8:00000002 r7:60000113 r6:eb321d8c r5:84d28000
 r4:84d28000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d28000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb321e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85031340
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d28000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae4f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8539af8c r4:8539ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8539af8c r4:8504b900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d28000 r8:8504b92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8504b900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8504b900 r8:80287e08 r7:eb325e60 r6:8504ba80 r5:84d28000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb321fb0 to 0xeb321ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85031300
INFO: task kworker/1:537:4774 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8d7aa000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r5:853d9800 r4:8291a680
 r4:00000000
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r9:83018205 r8:853d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
 r5:8539bb8c r4:8539b800
 r7:ddde2d80 r6:83018200 r5:8539bb8c r4:8504b980
 r10:00000000 r9:8504b980 r8:80287e08 r7:eb325e60 r6:84df0000 r5:853d9800
 r4:85031500
Call trace: 
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:539:4780 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:539   state:D stack:0     pid:4780  tgid:4780  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb339d84 r8:00000002 r7:60000113 r6:eb339d8c r5:853db000
 r4:853db000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853db000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb339e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85031680
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853db000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae87000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8539b78c r4:8539b400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8539b78c r4:8504bb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853db000 r8:8504bbac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8504bb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8504bb80 r8:80287e08 r7:eb32de60 r6:84df0080 r5:853db000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb339fb0 to 0xeb339ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:850315c0
INFO: task kworker/1:539:4780 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8db4a000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:540:4781 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:540   state:D stack:0     pid:4781  tgid:4781  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb33dd84 r8:00000002 r7:60000113 r6:eb33dd8c r5:853dbc00
 r4:853dbc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853dbc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb33de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850318c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaeb1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8539bf8c r4:8539bc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8539bf8c r4:8504bb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853dbc00 r8:8504bb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8504bb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8504bb00 r8:80287e08 r7:eb32de60 r6:84df0100 r5:853dbc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb33dfb0 to 0xeb33dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:850315c0
INFO: task kworker/1:540:4781 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r4:dffe1dc0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r5:85ef9f8c r4:85ef9c00
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:00000001
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
task:kworker/1:541   state:D stack:0     pid:4783  tgid:4783  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:853d8c00
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:00001000 r4:eb02f000
 r5:853a1f8c r4:853a1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:853d8c00 r8:8504bc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85031800
INFO: task kworker/1:541:4783 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8e15a000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:542:4785 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:542   state:D stack:0     pid:4785  tgid:4785  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb349d84 r8:00000002 r7:60000013 r6:eb349d8c r5:853dd400
 r4:853dd400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853dd400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb349e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85031a80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaecd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853a038c r4:853a0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853a038c r4:8504bd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853dd400 r8:8504bd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8504bd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8504bd00 r8:80287e08 r7:eb341e60 r6:84df0200 r5:853dd400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb349fb0 to 0xeb349ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85031980
INFO: task kworker/1:542:4785 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:00000000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:543:4788 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:543   state:D stack:0     pid:4788  tgid:4788  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb355d84 r8:00000002 r7:60000113 r6:eb355d8c r5:853da400
 r4:853da400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853da400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb355e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85031bc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853da400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaeed000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853a078c r4:853a0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853a078c r4:8504bd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853da400 r8:8504bdac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8504bd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8504bd80 r8:80287e08 r7:eb341e60 r6:84df0280 r5:853da400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb355fb0 to 0xeb355ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85031a40
INFO: task kworker/1:543:4788 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8e407000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
 r5:853dc800 r4:8291a680
 r4:00000000
 r4:00000000
 r5:853a0b8c r4:853a0800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fa0:                                     00000000 00000000 00000000 00000000
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:82ac21e4
 r4:dffe1dc0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:545:4790 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:545   state:D stack:0     pid:4790  tgid:4790  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb335d84 r8:00000002 r7:60000013 r6:eb335d8c r5:84d2a400
 r4:84d2a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d2a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb335e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85031e40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d2a400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf2f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853a0f8c r4:853a0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853a0f8c r4:8504bc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d2a400 r8:8504bcac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8504bc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8504bc80 r8:80287e08 r7:eb341e60 r6:8504bf00 r5:84d2a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb335fb0 to 0xeb335ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85031c40
INFO: task kworker/1:545:4790 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8e8ef000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018205 r8:84d2b000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
 r5:853a138c r4:853a1000
 r7:ddde2d80 r6:83018200 r5:853a138c r4:85362c80
 r4:00000001
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
1d20:                   8ebf5000 dfeb5000 00000001 80239b98 7f081000 00000001
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r5:85ef9f8c r4:85ef9c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:547:4795 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:547   state:D stack:0     pid:4795  tgid:4795  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb361d84 r8:00000002 r7:60000013 r6:eb361d8c r5:84d2bc00
 r4:84d2bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d2bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb361e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85385600
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d2bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb009000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853a178c r4:853a1400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853a178c r4:8504bf80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d2bc00 r8:8504bfac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8504bf80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8504bf80 r8:80287e08 r7:eb341e60 r6:8504be80 r5:84d2bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb361fb0 to 0xeb361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85031640
INFO: task kworker/1:547:4795 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r9:83018205 r8:84d2c800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
 r5:853a1b8c r4:853a1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853a1b8c r4:847e4080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d2c800 r8:847e40ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:847e4080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847e4080 r8:80287e08 r7:eb341e60 r6:847e4180 r5:84d2c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb369fb0 to 0xeb369ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e1280
INFO: task kworker/1:548:4798 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8ebf5000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
 r5:85ef9f8c r4:85ef9c00
 r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/1:549:4799 blocked for more than 466 seconds.
 r4:84d2d400
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb331e08
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853a2b8c r4:853a2800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853a2b8c r4:847e4000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d2d400 r8:847e402c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:847e4000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847e4000 r8:80287e08 r7:eb341e60 r6:847e4100 r5:84d2d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb331fb0 to 0xeb331ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e1280
INFO: task kworker/1:549:4799 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8ef44000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
      Not tainted 6.15.0-rc6-syzkaller #0
 r4:84d2e000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r5:00001000 r4:eb03d000
 r5:853a238c r4:853a2000
 r10:61c88647 r9:84d2e000 r8:847e422c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8f385000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:551:4804 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:551   state:D stack:0     pid:4804  tgid:4804  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:84d2ec00 r4:8291a680
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb375e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e13c0
 r5:853a278c r4:853a2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:84d2ec00 r8:847e42ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
Exception stack(0xeb375fb0 to 0xeb375ff8)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e1380
INFO: task kworker/1:551:4804 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8f76b000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:552:4805 blocked for more than 466 seconds.
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:853a2f8c r4:853a2c00
 r4:847e4300
Exception stack(0xeb36dfb0 to 0xeb36dff8)
INFO: task kworker/1:552:4805 is blocked on a mutex likely owned by task kworker/0:123:3540.
 r4:00000000
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:553:4808 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:553   state:D stack:0     pid:4808  tgid:4808  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb379d84 r8:00000002 r7:60000113 r6:eb379d8c r5:84d28c00
 r4:84d28c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d28c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb379e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e1800
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d28c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb089000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853a338c r4:853a3000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:554:4810 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:554   state:D stack:0     pid:4810  tgid:4810  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:8525d400 r8:847e46ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8fdb6000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
INFO: task kworker/1:555:4811 blocked for more than 466 seconds.
 r4:853f8000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:853a378c r4:853a3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853a378c r4:847e4580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853f8000 r8:847e45ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:847e4580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847e4580 r8:80287e08 r7:eb381e60 r6:847e4880 r5:853f8000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb385fb0 to 0xeb385ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e1940
INFO: task kworker/1:555:4811 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   8fdb6000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:85ef9f8c r4:85ef9c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
INFO: task kworker/1:556:4814 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:556   state:D stack:0     pid:4814  tgid:4814  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb389d84 r8:00000002 r7:60000013 r6:eb389d8c r5:853f8c00
 r4:853f8c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853f8c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb389e08
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853a3f8c r4:853a3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853a3f8c r4:847e4700
 r10:61c88647 r9:853f8c00 r8:847e472c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r10:00000000 r9:847e4700 r8:80287e08 r7:eb381e60 r6:847e4980 r5:853f8c00
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r5:85ef9f8c r4:85ef9c00
 r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
 r4:84d87ac0
task:kworker/1:557   state:D stack:0     pid:4815  tgid:4815  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:853f9800
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018205 r8:853f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
 r5:853ac38c r4:853ac000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853ac38c r4:847e4a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853f9800 r8:847e4a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:847e4a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847e4a00 r8:80287e08 r7:eb389e60 r6:847e4800 r5:853f9800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb37dfb0 to 0xeb37dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e1ac0
INFO: task kworker/1:557:4815 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   90423000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:558:4817 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:558   state:D stack:0     pid:4817  tgid:4817  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r4:853fa400
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb395e08
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:558:4817 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   90467000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:559:4819 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:559   state:D stack:0     pid:4819  tgid:4819  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb399d84 r8:00000002 r7:60000013 r6:eb399d8c r5:853fb000
 r4:853fb000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853fb000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb399e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d5a240
 r9:83018205 r8:853fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
 r5:853acb8c r4:853ac800
 r7:ddde2d80 r6:83018200 r5:853acb8c r4:847e4a80
 r10:00000000 r9:847e4a80 r8:80287e08 r7:eb395e60 r6:847e4b00 r5:853fb000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
1d20:                   906b9000 dfeb5000 00000001 80239b98 7f081000 00000001
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r5:00001000 r4:dfa13000
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r4:00000001
1fa0:                                     00000000 00000000 00000000 00000000
task:kworker/1:560   state:D stack:0     pid:4821  tgid:4821  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xeb3a5fb0 to 0xeb3a5ff8)
INFO: task kworker/1:560:4821 is blocked on a mutex likely owned by task kworker/0:123:3540.
1d20:                   90b55000 dfeb5000 00000001 80239b98 7f081000 00000001
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:561:4823 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:561   state:D stack:0     pid:4823  tgid:4823  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb3a9d84 r8:00000002 r7:60000113 r6:eb3a9d8c r5:853fc800
 r4:853fc800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853fc800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d5a6c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb125000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853ad78c r4:853ad400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853ad78c r4:847e4c80
 r10:61c88647 r9:853fc800 r8:847e4cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
1d20:                   90e1b000 dfeb5000 00000001 80239b98 7f081000 00000001
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:562:4824 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:562   state:D stack:0     pid:4824  tgid:4824  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb3b1d84 r8:00000002 r7:60000113 r6:eb3b1d8c r5:853fd400
 r4:853fd400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853fd400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d5a640
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb115000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853ad38c r4:853ad000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853ad38c r4:847e4d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853fd400 r8:847e4d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:847e4d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847e4d00 r8:80287e08 r7:eb3a9e60 r6:847e4e00 r5:853fd400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3b1fb0 to 0xeb3b1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d5a3c0
INFO: task kworker/1:562:4824 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r5:853de000 r4:8291a680
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3bde08
 r9:83018205 r8:853de000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb131000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853adb8c r4:853ad800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853adb8c r4:847e4f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853de000 r8:847e4fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:847e4f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847e4f80 r8:80287e08 r7:eb3a9e60 r6:84df0380 r5:853de000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3bdfb0 to 0xeb3bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d5a8c0
INFO: task kworker/1:563:4827 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   91492000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb3c5d84 r8:00000002 r7:60000113 r6:eb3c5d8c r5:84d46c00
 r4:84d46c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d46c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d46c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb38b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853af78c r4:853af400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853af78c r4:8536d000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d46c00 r8:8536d02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8536d000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8536d000 r8:80287e08 r7:eb3bde60 r6:84df0400 r5:84d46c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3c5fb0 to 0xeb3c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d5a800
INFO: task kworker/1:564:4829 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r5:80070013 r4:80239bb0
 r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fa0:                                     00000000 00000000 00000000 00000000
task:kworker/1:565   state:D stack:0     pid:4830  tgid:4830  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9167d000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r5:84c70c00 r4:8291a680
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d1e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:853ae38c r4:853ae000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:8536d080 r8:80287e08 r7:eb3c5e60 r6:84df0500 r5:84c70c00
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r5:80070013 r4:80239bb0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:567   state:D stack:0     pid:4834  tgid:4834  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d9e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xeb3d9fb0 to 0xeb3d9ff8)
INFO: task kworker/1:567:4834 is blocked on a mutex likely owned by task kworker/0:123:3540.
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:568:4836 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:568   state:D stack:0     pid:4836  tgid:4836  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb3e1d84 r8:00000002 r7:60000013 r6:eb3e1d8c r5:84c71800
 r4:84c71800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84c71800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d5ad40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84c71800 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb169000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853aeb8c r4:853ae800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853aeb8c r4:8536d300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84c71800 r8:8536d32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8536d300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8536d300 r8:80287e08 r7:eb3c5e60 r6:84df0600 r5:84c71800
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r5:85ef9f8c r4:85ef9c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:84d87ac0
task:kworker/1:569   state:D stack:0     pid:4838  tgid:4838  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb405e08
 r9:83018205 r8:84c70000 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000
 r5:853aef8c r4:853aec00
 r10:61c88647 r9:84c70000 r8:8536d3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:00000000
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:570:4840 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:570   state:D stack:0     pid:4840  tgid:4840  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb421d84 r8:00000002 r7:60000113 r6:eb421d8c r5:84c73000
 r4:84c73000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84c73000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb421e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062180
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84c73000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb3e5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853afb8c r4:853af800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853afb8c r4:8536d100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84c73000 r8:8536d12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8536d100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8536d100 r8:80287e08 r7:eb3c5e60 r6:84df0700 r5:84c73000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb421fb0 to 0xeb421ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847e1dc0
INFO: task kworker/1:570:4840 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   92428000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
      Not tainted 6.15.0-rc6-syzkaller #0
 r5:84c73c00 r4:8291a680
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850626c0
 r5:853b0b8c r4:853b0800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
1d20:                   92428000 dfeb5000 00000001 80239b98 7f081000 00000001
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:572:4844 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:572   state:D stack:0     pid:4844  tgid:4844  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb439d84 r8:00000002 r7:60000113 r6:eb439d8c r5:84c76000
 r4:84c76000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84c76000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb439e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850622c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84c76000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb433000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853aff8c r4:853afc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853aff8c r4:8536d580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84c76000 r8:8536d5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8536d580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8536d580 r8:80287e08 r7:eb429e60 r6:84df0800 r5:84c76000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb439fb0 to 0xeb439ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85062140
INFO: task kworker/1:572:4844 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Call trace: 
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:85ef9f8c r4:85ef9c00
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r5:853b038c r4:853b0000
 r4:8536d600
Exception stack(0xeb445fb0 to 0xeb445ff8)
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   92b36000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:574:4848 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:574   state:D stack:0     pid:4848  tgid:4848  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb455d84 r8:00000002 r7:60000013 r6:eb455d8c r5:84c74800
 r4:84c74800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84c74800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb455e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062580
 r5:853b078c r4:853b0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:8536d680
Exception stack(0xeb455fb0 to 0xeb455ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/1:575:4851 blocked for more than 467 seconds.
 r4:84c76c00
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b9e08
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:84c76c00 r8:8536d72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d20:                   93005000 dfeb5000 00000001 80239b98 7f081000 00000001
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:576:4853 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:576   state:D stack:0     pid:4853  tgid:4853  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb1c5d84 r8:00000002 r7:60000113 r6:eb1c5d8c r5:853d8000
 r4:853d8000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853d8000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062a00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea99d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b138c r4:853b1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b138c r4:8536d480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853d8000 r8:8536d4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8536d480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8536d480 r8:80287e08 r7:eb1b9e60 r6:84df0a00 r5:853d8000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1c5fb0 to 0xeb1c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85062800
INFO: task kworker/1:576:4853 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:82ac21e4
 r4:dffe1dc0
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
      Not tainted 6.15.0-rc6-syzkaller #0
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b5e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062a80
 r5:853b178c r4:853b1400
 r10:61c88647 r9:853fe000 r8:8536d82c r7:82804d40 r6:ddde2d80 r5:ddde2da0
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:578:4859 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:578   state:D stack:0     pid:4859  tgid:4859  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb3add84 r8:00000002 r7:60000113 r6:eb3add8c r5:853fec00
 r4:853fec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853fec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ade08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062c40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaadf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b1b8c r4:853b1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b1b8c r4:8536d200
 r10:61c88647 r9:853fec00 r8:8536d22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fa0:                                     00000000 00000000 00000000 00000000
task:kworker/1:579   state:D stack:0     pid:4861  tgid:4861  ppid:2      task_flags:0x4208060 flags:0x00000000
 r9:83018205 r8:85400000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
 r10:61c88647 r9:85400000 r8:8536d92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8536d900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8536d900 r8:80287e08 r7:eb3ade60 r6:8536da80 r5:85400000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1cdfb0 to 0xeb1cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85062b80
INFO: task kworker/1:579:4861 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   93c92000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r4:84e0be80
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e1f40
 r5:853b278c r4:853b2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:85400c00 r8:8536d9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85062d80
INFO: task kworker/1:580:4864 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   93c92000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:581:4865 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:581   state:D stack:0     pid:4865  tgid:4865  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb44dd84 r8:00000002 r7:60000113 r6:eb44dd8c r5:85401800
 r4:85401800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85401800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb44de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062f40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85401800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac5f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b238c r4:853b2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b238c r4:8536da00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85401800 r8:8536da2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8536da00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8536da00 r8:80287e08 r7:eb24de60 r6:8536db00 r5:85401800
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
1d20:                   9422e000 dfeb5000 00000001 80239b98 7f081000 00000001
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/1:582:4867 blocked for more than 467 seconds.
 r5:85402400 r4:8291a680
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fb040
 r5:853b2b8c r4:853b2800
 r10:61c88647 r9:85402400 r8:8536dc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
1d20:                   9422e000 dfeb5000 00000001 80239b98 7f081000 00000001
 r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
      Not tainted 6.15.0-rc6-syzkaller #0
 r4:85403000
 r5:85403000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb281e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fb380
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85403000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadd5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b338c r4:853b3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b338c r4:8536dd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85403000 r8:8536ddac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8536dd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8536dd80 r8:80287e08 r7:eb25de60 r6:8536de80 r5:85403000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb281fb0 to 0xeb281ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852fb2c0
INFO: task kworker/1:583:4869 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9422e000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fa0:                                     00000000 00000000 00000000 00000000
 r4:84d87ac0
INFO: task kworker/1:584:4872 blocked for more than 467 seconds.
Workqueue: events bpf_prog_free_deferred
 r4:85403c00
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb29de08
 r4:00000000
 r5:00001000 r4:eaf9f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b3b8c r4:853b3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b3b8c r4:8536dc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85403c00 r8:8536dcac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8536dc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8536dc80 r8:80287e08 r7:eb281e60 r6:847e4f00 r5:85403c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb29dfb0 to 0xeb29dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852fb340
INFO: task kworker/1:584:4872 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   94806000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:585:4874 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:585   state:D stack:0     pid:4874  tgid:4874  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb299d84 r8:00000002 r7:60000113 r6:eb299d8c r5:85404800
 r4:85404800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85404800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb299e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fb500
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85404800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf95000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b378c r4:853b3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b378c r4:85307f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85404800 r8:85307f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85307f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85307f00 r8:80287e08 r7:eb29de60 r6:85307c80 r5:85404800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb299fb0 to 0xeb299ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852fb4c0
INFO: task kworker/1:585:4874 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   94f95000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:586:4876 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:586   state:D stack:0     pid:4876  tgid:4876  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb2b1d84 r8:00000002 r7:60000013 r6:eb2b1d8c r5:85405400
 r4:85405400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85405400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fb800
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85405400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaff1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b3f8c r4:853b3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b3f8c r4:8536df80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85405400 r8:8536dfac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8536df80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8536df80 r8:80287e08 r7:eb29de60 r6:8536de00 r5:85405400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2b1fb0 to 0xeb2b1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852fb580
INFO: task kworker/1:586:4876 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   94f95000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:587:4878 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:587   state:D stack:0     pid:4878  tgid:4878  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb2e1d84 r8:00000002 r7:60000013 r6:eb2e1d8c r5:85406000
 r4:85406000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85406000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fb940
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85406000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb001000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853bc38c r4:853bc000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853bc38c r4:852e3100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85406000 r8:852e312c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852e3100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852e3100 r8:80287e08 r7:eb2b1e60 r6:852e3180 r5:85406000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2e1fb0 to 0xeb2e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852fb7c0
INFO: task kworker/1:587:4878 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   95046000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:588:4880 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:588   state:D stack:0     pid:4880  tgid:4880  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb45dd84 r8:00000002 r7:60000113 r6:eb45dd8c r5:85406c00
 r4:85406c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85406c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb45de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fbac0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85406c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb1a7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853bc78c r4:853bc400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853bc78c r4:852e3000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85406c00 r8:852e302c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852e3000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852e3000 r8:80287e08 r7:eb2e1e60 r6:852e3280 r5:85406c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb45dfb0 to 0xeb45dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852fb880
INFO: task kworker/1:588:4880 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9569f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:589:4883 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:589   state:D stack:0     pid:4883  tgid:4883  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb461d84 r8:00000002 r7:60000013 r6:eb461d8c r5:85408000
 r4:85408000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85408000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb461e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fbc40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85408000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb1b1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853bcb8c r4:853bc800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853bcb8c r4:852e3080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85408000 r8:852e30ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852e3080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852e3080 r8:80287e08 r7:eb45de60 r6:852e3380 r5:85408000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb461fb0 to 0xeb461ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852fba80
INFO: task kworker/1:589:4883 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9569f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:590:4885 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:590   state:D stack:0     pid:4885  tgid:4885  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb465d84 r8:00000002 r7:60000013 r6:eb465d8c r5:85409800
 r4:85409800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85409800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb465e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fbdc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85409800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb1df000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853bcf8c r4:853bcc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853bcf8c r4:852e3200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85409800 r8:852e322c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852e3200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852e3200 r8:80287e08 r7:eb461e60 r6:852e3480 r5:85409800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb465fb0 to 0xeb465ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852fbc00
INFO: task kworker/1:590:4885 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   95cb9000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:591:4886 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:591   state:D stack:0     pid:4886  tgid:4886  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb46dd84 r8:00000002 r7:60000113 r6:eb46dd8c r5:8540a400
 r4:8540a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8540a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb46de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f6140
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8540a400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb203000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8533838c r4:85338000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8533838c r4:852e3300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8540a400 r8:852e332c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852e3300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852e3300 r8:80287e08 r7:eb465e60 r6:852e3400 r5:8540a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb46dfb0 to 0xeb46dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852fbc00
INFO: task kworker/1:591:4886 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   95cb9000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:289:4889 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:289   state:D stack:0     pid:4889  tgid:4889  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb475d84 r8:00000002 r7:60000013 r6:eb475d8c r5:8540bc00
 r4:8540bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8540bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb475e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f66c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8540bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb23f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8533938c r4:85339000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8533938c r4:84df0b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8540bc00 r8:84df0bac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84df0b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84df0b80 r8:80287e08 r7:eaf55e60 r6:852e3500 r5:8540bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb475fb0 to 0xeb475ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853f6240
INFO: task kworker/0:289:4889 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   95ebc000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:290:4890 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:290   state:D stack:0     pid:4890  tgid:4890  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb47dd84 r8:00000002 r7:60000113 r6:eb47dd8c r5:8540c800
 r4:8540c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8540c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb47de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f6300
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8540c800 r7:00000000 r6:83018000 r5:00001000 r4:7f089000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb219000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8533878c r4:85338400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8533878c r4:84df0c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8540c800 r8:84df0c2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84df0c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84df0c00 r8:80287e08 r7:eb475e60 r6:852e3580 r5:8540c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb47dfb0 to 0xeb47dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853f6240
INFO: task kworker/0:290:4890 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   962f1000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:592:4891 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:592   state:D stack:0     pid:4891  tgid:4891  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb481d84 r8:00000002 r7:60000013 r6:eb481d8c r5:8540d400
 r4:8540d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8540d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb481e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85057880
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8540d400 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb26b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853bd38c r4:853bd000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853bd38c r4:852e3600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8540d400 r8:852e362c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852e3600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852e3600 r8:80287e08 r7:eb46de60 r6:852e3680 r5:8540d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb481fb0 to 0xeb481ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:850571c0
INFO: task kworker/1:592:4891 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   96685000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:291:4893 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:291   state:D stack:0     pid:4893  tgid:4893  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb489d84 r8:00000002 r7:60000113 r6:eb489d8c r5:8540e000
 r4:8540e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8540e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb489e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f6480
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8540e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb225000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85338b8c r4:85338800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85338b8c r4:84df0a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8540e000 r8:84df0aac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84df0a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84df0a80 r8:80287e08 r7:eb475e60 r6:84df0d00 r5:8540e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb489fb0 to 0xeb489ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853f62c0
INFO: task kworker/0:291:4893 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   96685000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:292:4895 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:292   state:D stack:0     pid:4895  tgid:4895  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb469d84 r8:00000002 r7:60000113 r6:eb469d8c r5:853e9800
 r4:853e9800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853e9800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb469e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f6640
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:853e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb237000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85338f8c r4:85338c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85338f8c r4:84df0b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853e9800 r8:84df0b2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84df0b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84df0b00 r8:80287e08 r7:eb475e60 r6:84df0e00 r5:853e9800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb469fb0 to 0xeb469ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853f6440
INFO: task kworker/0:292:4895 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   96890000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:593:4896 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:593   state:D stack:0     pid:4896  tgid:4896  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb471d84 r8:00000002 r7:60000013 r6:eb471d8c r5:853e8000
 r4:853e8000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853e8000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb471e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85057c40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa1b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853be78c r4:853be400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853be78c r4:852e3700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853e8000 r8:852e372c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852e3700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852e3700 r8:80287e08 r7:eb481e60 r6:84df0c80 r5:853e8000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb471fb0 to 0xeb471ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:850573c0
INFO: task kworker/1:593:4896 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   96f3d000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:293:4900 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:293   state:D stack:0     pid:4900  tgid:4900  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb48dd84 r8:00000002 r7:60000113 r6:eb48dd8c r5:853ea400
 r4:853ea400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853ea400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb48de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f6880
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:853ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f091000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb25f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8533978c r4:85339400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8533978c r4:84df0d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853ea400 r8:84df0dac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84df0d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84df0d80 r8:80287e08 r7:eb475e60 r6:84df0e80 r5:853ea400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb48dfb0 to 0xeb48dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853f6700
INFO: task kworker/0:293:4900 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   97401000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:294:4902 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:294   state:D stack:0     pid:4902  tgid:4902  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb495d84 r8:00000002 r7:60000113 r6:eb495d8c r5:853eb000
 r4:853eb000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853eb000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb495e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d52700
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:853eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb653000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8533a78c r4:8533a400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8533a78c r4:84df0f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853eb000 r8:84df0f2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84df0f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84df0f00 r8:80287e08 r7:eb48de60 r6:84df0f80 r5:853eb000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb495fb0 to 0xeb495ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853f67c0
INFO: task kworker/0:294:4902 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   975b0000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:295:4904 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:295   state:D stack:0     pid:4904  tgid:4904  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb491d84 r8:00000002 r7:60000113 r6:eb491d8c r5:853ebc00
 r4:853ebc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853ebc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb491e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d52840
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:853ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb645000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8533a38c r4:8533a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8533a38c r4:852ed000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853ebc00 r8:852ed02c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:852ed000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852ed000 r8:80287e08 r7:eb495e60 r6:852ed080 r5:853ebc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb491fb0 to 0xeb491ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853f67c0
INFO: task kworker/0:295:4904 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   97d18000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:594:4906 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:594   state:D stack:0     pid:4906  tgid:4906  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb49dd84 r8:00000002 r7:60000113 r6:eb49dd8c r5:853ec800
 r4:853ec800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853ec800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb49de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85057900
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb277000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853bd78c r4:853bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853bd78c r4:852e3780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853ec800 r8:852e37ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852e3780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852e3780 r8:80287e08 r7:eb471e60 r6:852ed100 r5:853ec800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb49dfb0 to 0xeb49dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85057940
INFO: task kworker/1:594:4906 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   98279000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:595:4910 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:595   state:D stack:0     pid:4910  tgid:4910  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4add84 r8:00000002 r7:60000013 r6:eb4add8c r5:853e8c00
 r4:853e8c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853e8c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ade08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85057ac0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb287000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853bdb8c r4:853bd800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853bdb8c r4:852e3880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853e8c00 r8:852e38ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852e3880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852e3880 r8:80287e08 r7:eb471e60 r6:852ed180 r5:853e8c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4adfb0 to 0xeb4adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85057a00
INFO: task kworker/1:595:4910 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   98898000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:596:4911 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:596   state:D stack:0     pid:4911  tgid:4911  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb345d84 r8:00000002 r7:60000113 r6:eb345d8c r5:853ed400
 r4:853ed400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853ed400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb345e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85057b40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2a5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853bdf8c r4:853bdc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853bdf8c r4:852e3900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853ed400 r8:852e392c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852e3900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852e3900 r8:80287e08 r7:eb471e60 r6:852ed200 r5:853ed400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb345fb0 to 0xeb345ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85057a00
INFO: task kworker/1:596:4911 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   98898000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:597:4912 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:597   state:D stack:0     pid:4912  tgid:4912  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb34dd84 r8:00000002 r7:60000113 r6:eb34dd8c r5:853ee000
 r4:853ee000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853ee000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb34de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85057d00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2b5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853be38c r4:853be000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853be38c r4:852e3800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853ee000 r8:852e382c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852e3800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852e3800 r8:80287e08 r7:eb471e60 r6:852ed280 r5:853ee000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb34dfb0 to 0xeb34dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85057c40
INFO: task kworker/1:597:4912 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   98d7b000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:598:4913 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:598   state:D stack:0     pid:4913  tgid:4913  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb41dd84 r8:00000002 r7:60000113 r6:eb41dd8c r5:846a0000
 r4:846a0000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:846a0000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb41de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ec040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:846a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e063b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853bf38c r4:853bf000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853bf38c r4:852e3980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:846a0000 r8:852e39ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852e3980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852e3980 r8:80287e08 r7:eb471e60 r6:852ed300 r5:846a0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb41dfb0 to 0xeb41dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85057c40
INFO: task kworker/1:598:4913 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   98d7b000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:599:4916 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:599   state:D stack:0     pid:4916  tgid:4916  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb42dd84 r8:00000002 r7:60000013 r6:eb42dd8c r5:846a0c00
 r4:846a0c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:846a0c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb42de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85057700
 r4:00000000
 r5:00001000 r4:dfea1000
 r5:853beb8c r4:853be800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853beb8c r4:852e3a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:846a0c00 r8:852e3a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852e3a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852e3a00 r8:80287e08 r7:eb41de60 r6:852ed380 r5:846a0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb42dfb0 to 0xeb42dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85057fc0
INFO: task kworker/1:599:4916 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   98f79000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:600:4917 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:600   state:D stack:0     pid:4917  tgid:4917  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4b1d84 r8:00000002 r7:60000113 r6:eb4b1d8c r5:846a1800
 r4:846a1800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850571c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:846a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e04cd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853bef8c r4:853bec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853bef8c r4:852e3b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:846a1800 r8:852e3b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852e3b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852e3b00 r8:80287e08 r7:eb41de60 r6:852ed400 r5:846a1800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4b1fb0 to 0xeb4b1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85057e80
INFO: task kworker/1:600:4917 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   992a0000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:601:4920 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:601   state:D stack:0     pid:4920  tgid:4920  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4a9d84 r8:00000002 r7:60000113 r6:eb4a9d8c r5:8540ec00
 r4:8540ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8540ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ec340
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8540ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e8961000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853bfb8c r4:853bf800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853bfb8c r4:852e3c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8540ec00 r8:852e3c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852e3c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852e3c00 r8:80287e08 r7:eb41de60 r6:852e3a80 r5:8540ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4a9fb0 to 0xeb4a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852ec240
INFO: task kworker/1:601:4920 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   996be000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:602:4922 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:602   state:D stack:0     pid:4922  tgid:4922  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4a1d84 r8:00000002 r7:60000113 r6:eb4a1d8c r5:8540b000
 r4:8540b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8540b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ec140
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8540b000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0811000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853bf78c r4:853bf400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853bf78c r4:852e3c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8540b000 r8:852e3cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852e3c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852e3c80 r8:80287e08 r7:eb4a9e60 r6:852e3b80 r5:8540b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4a1fb0 to 0xeb4a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852ec240
INFO: task kworker/1:602:4922 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   99a1c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:603:4925 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:603   state:D stack:0     pid:4925  tgid:4925  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4c5d84 r8:00000002 r7:60000113 r6:eb4c5d8c r5:846a3000
 r4:846a3000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:846a3000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ec480
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:846a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab2d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853bff8c r4:853bfc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853bff8c r4:852e3e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:846a3000 r8:852e3e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852e3e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852e3e00 r8:80287e08 r7:eb4a9e60 r6:852ed480 r5:846a3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4c5fb0 to 0xeb4c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852ec300
INFO: task kworker/1:603:4925 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   99a1c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:604:4927 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:604   state:D stack:0     pid:4927  tgid:4927  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4cdd84 r8:00000002 r7:60000113 r6:eb4cdd8c r5:846a2400
 r4:846a2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:846a2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4cde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ec5c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:846a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead03000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c438c r4:853c4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c438c r4:852e3d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:846a2400 r8:852e3d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852e3d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852e3d00 r8:80287e08 r7:eb4c5e60 r6:852ed500 r5:846a2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4cdfb0 to 0xeb4cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852ec3c0
INFO: task kworker/1:604:4927 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   99bd9000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:605:4928 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:605   state:D stack:0     pid:4928  tgid:4928  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4d1d84 r8:00000002 r7:60000113 r6:eb4d1d8c r5:846a3c00
 r4:846a3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:846a3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ecb00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:846a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae93000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c538c r4:853c5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c538c r4:852e3f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:846a3c00 r8:852e3f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852e3f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852e3f00 r8:80287e08 r7:eb4cde60 r6:852ed580 r5:846a3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4d1fb0 to 0xeb4d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852ec3c0
INFO: task kworker/1:605:4928 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   99bd9000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:606:4929 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:606   state:D stack:0     pid:4929  tgid:4929  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4d5d84 r8:00000002 r7:60000013 r6:eb4d5d8c r5:846a5400
 r4:846a5400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:846a5400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ec740
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:846a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae23000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c478c r4:853c4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c478c r4:8536df00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:846a5400 r8:8536df2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8536df00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8536df00 r8:80287e08 r7:eb4d1e60 r6:852ed600 r5:846a5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4d5fb0 to 0xeb4d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852ec3c0
INFO: task kworker/1:606:4929 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9a57f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:607:4932 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:607   state:D stack:0     pid:4932  tgid:4932  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4e1d84 r8:00000002 r7:60000113 r6:eb4e1d8c r5:846a6000
 r4:846a6000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:846a6000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ec880
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:846a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae3d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c4b8c r4:853c4800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c4b8c r4:84dfc000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:846a6000 r8:84dfc02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dfc000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dfc000 r8:80287e08 r7:eb4d1e60 r6:852ed680 r5:846a6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4e1fb0 to 0xeb4e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852ec7c0
INFO: task kworker/1:607:4932 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9a57f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:608:4934 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:608   state:D stack:0     pid:4934  tgid:4934  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4e9d84 r8:00000002 r7:60000113 r6:eb4e9d8c r5:85430000
 r4:85430000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85430000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ec9c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85430000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae5b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c4f8c r4:853c4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c4f8c r4:84dfc080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85430000 r8:84dfc0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dfc080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dfc080 r8:80287e08 r7:eb4d1e60 r6:852ed700 r5:85430000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4e9fb0 to 0xeb4e9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852ec900
INFO: task kworker/1:608:4934 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9a7d6000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:609:4935 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:609   state:D stack:0     pid:4935  tgid:4935  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4edd84 r8:00000002 r7:60000013 r6:eb4edd8c r5:85430c00
 r4:85430c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85430c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ede08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ecdc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85430c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaecf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c5b8c r4:853c5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c5b8c r4:84dfc200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85430c00 r8:84dfc22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dfc200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dfc200 r8:80287e08 r7:eb4d1e60 r6:852ed780 r5:85430c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4edfb0 to 0xeb4edff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852ec900
INFO: task kworker/1:609:4935 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9a7d6000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:610:4938 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:610   state:D stack:0     pid:4938  tgid:4938  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4f9d84 r8:00000002 r7:60000013 r6:eb4f9d8c r5:85433000
 r4:85433000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85433000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ecc40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85433000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaeaf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c578c r4:853c5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c578c r4:84dfc280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85433000 r8:84dfc2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dfc280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dfc280 r8:80287e08 r7:eb4ede60 r6:852ed800 r5:85433000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4f9fb0 to 0xeb4f9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852eca40
INFO: task kworker/1:610:4938 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9ab5e000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:611:4941 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:611   state:D stack:0     pid:4941  tgid:4941  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb501d84 r8:00000002 r7:60000013 r6:eb501d8c r5:85432400
 r4:85432400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85432400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb501e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ece40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85432400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaef9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c5f8c r4:853c5c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:84dfc300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85432400 r8:84dfc32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dfc300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dfc300 r8:80287e08 r7:eb4ede60 r6:852ed880 r5:85432400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb501fb0 to 0xeb501ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852ecd80
INFO: task kworker/1:611:4941 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9ab5e000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:612:4942 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:612   state:D stack:0     pid:4942  tgid:4942  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb505d84 r8:00000002 r7:60000013 r6:eb505d8c r5:85431800
 r4:85431800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85431800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb505e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84574580
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85431800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb007000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c678c r4:853c6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c678c r4:84dfc180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85431800 r8:84dfc1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dfc180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dfc180 r8:80287e08 r7:eb501e60 r6:852ed900 r5:85431800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb505fb0 to 0xeb505ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852ece80
INFO: task kworker/1:612:4942 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9b5f5000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:613:4943 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:613   state:D stack:0     pid:4943  tgid:4943  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb509d84 r8:00000002 r7:60000013 r6:eb509d8c r5:85434800
 r4:85434800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85434800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb509e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85057740
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85434800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf39000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c638c r4:853c6000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c638c r4:84dfc380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85434800 r8:84dfc3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dfc380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dfc380 r8:80287e08 r7:eb505e60 r6:852ed980 r5:85434800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb509fb0 to 0xeb509ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852ece80
INFO: task kworker/1:613:4943 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9b5f5000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:614:4946 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:614   state:D stack:0     pid:4946  tgid:4946  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb50dd84 r8:00000002 r7:60000113 r6:eb50dd8c r5:85435400
 r4:85435400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85435400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb50de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fd000
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85435400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb023000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c6b8c r4:853c6800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c6b8c r4:84dfc100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85435400 r8:84dfc12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dfc100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dfc100 r8:80287e08 r7:eb505e60 r6:852eda00 r5:85435400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb50dfb0 to 0xeb50dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845744c0
INFO: task kworker/1:614:4946 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9bb20000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:615:4948 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:615   state:D stack:0     pid:4948  tgid:4948  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb515d84 r8:00000002 r7:60000013 r6:eb515d8c r5:85436c00
 r4:85436c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85436c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb515e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fd140
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85436c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb02d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c6f8c r4:853c6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c6f8c r4:84dfc480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85436c00 r8:84dfc4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dfc480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dfc480 r8:80287e08 r7:eb50de60 r6:852eda80 r5:85436c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb515fb0 to 0xeb515ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852fd240
INFO: task kworker/1:615:4948 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9bb20000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:616:4950 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:616   state:D stack:0     pid:4950  tgid:4950  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb51dd84 r8:00000002 r7:60000013 r6:eb51dd8c r5:846a4800
 r4:846a4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:846a4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb51de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fd440
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:846a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb05b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c778c r4:853c7400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c778c r4:84dfc400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:846a4800 r8:84dfc42c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dfc400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dfc400 r8:80287e08 r7:eb515e60 r6:852edb00 r5:846a4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb51dfb0 to 0xeb51dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852fd240
INFO: task kworker/1:616:4950 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9bee5000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:617:4951 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:617   state:D stack:0     pid:4951  tgid:4951  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4f5d84 r8:00000002 r7:60000113 r6:eb4f5d8c r5:85408c00
 r4:85408c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85408c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fd300
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85408c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb047000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c738c r4:853c7000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c738c r4:84dfc580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85408c00 r8:84dfc5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dfc580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dfc580 r8:80287e08 r7:eb51de60 r6:84dfc680 r5:85408c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4f5fb0 to 0xeb4f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852fd100
INFO: task kworker/1:617:4951 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9c649000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:618:4954 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:618   state:D stack:0     pid:4954  tgid:4954  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb519d84 r8:00000002 r7:60000113 r6:eb519d8c r5:853eec00
 r4:853eec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853eec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb519e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fd740
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb09d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c7f8c r4:853c7c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c7f8c r4:84dfc780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853eec00 r8:84dfc7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dfc780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dfc780 r8:80287e08 r7:eb51de60 r6:84dfc600 r5:853eec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb519fb0 to 0xeb519ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852fd640
INFO: task kworker/1:618:4954 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9c649000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:619:4955 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:619   state:D stack:0     pid:4955  tgid:4955  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4b9d84 r8:00000002 r7:60000113 r6:eb4b9d8c r5:85418000
 r4:85418000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85418000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fd600
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85418000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb06d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c7b8c r4:853c7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c7b8c r4:84dfc500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85418000 r8:84dfc52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dfc500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dfc500 r8:80287e08 r7:eb519e60 r6:84dfc880 r5:85418000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4b9fb0 to 0xeb4b9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852fd640
INFO: task kworker/1:619:4955 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9cd72000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:620:4958 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:620   state:D stack:0     pid:4958  tgid:4958  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb525d84 r8:00000002 r7:60000013 r6:eb525d8c r5:85418c00
 r4:85418c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85418c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb525e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fd7c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85418c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0bf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8548438c r4:85484000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8548438c r4:84dfc700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85418c00 r8:84dfc72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dfc700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dfc700 r8:80287e08 r7:eb519e60 r6:84dfc900 r5:85418c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb525fb0 to 0xeb525ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852fd940
INFO: task kworker/1:620:4958 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9cd72000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:621:4960 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:621   state:D stack:0     pid:4960  tgid:4960  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb52dd84 r8:00000002 r7:60000013 r6:eb52dd8c r5:85419800
 r4:85419800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85419800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb52de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fdc40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85419800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0df000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85484b8c r4:85484800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85484b8c r4:84dfc980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85419800 r8:84dfc9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dfc980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dfc980 r8:80287e08 r7:eb525e60 r6:84dfca80 r5:85419800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb52dfb0 to 0xeb52dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852fd800
INFO: task kworker/1:621:4960 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9cec0000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:622:4962 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:622   state:D stack:0     pid:4962  tgid:4962  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb531d84 r8:00000002 r7:60000013 r6:eb531d8c r5:8541b000
 r4:8541b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8541b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb531e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fda00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8541b000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0d3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8548478c r4:85484400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8548478c r4:84dfc800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8541b000 r8:84dfc82c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dfc800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dfc800 r8:80287e08 r7:eb52de60 r6:84dfca00 r5:8541b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb531fb0 to 0xeb531ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852fd9c0
INFO: task kworker/1:622:4962 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9d258000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:623:4964 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:623   state:D stack:0     pid:4964  tgid:4964  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb529d84 r8:00000002 r7:60000013 r6:eb529d8c r5:8541bc00
 r4:8541bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8541bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb529e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fdec0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8541bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb10f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8548538c r4:85485000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8548538c r4:84dfcb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8541bc00 r8:84dfcb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dfcb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dfcb00 r8:80287e08 r7:eb52de60 r6:84dfcc80 r5:8541bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb529fb0 to 0xeb529ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852fdc00
INFO: task kworker/1:623:4964 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9d258000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:624:4966 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:624   state:D stack:0     pid:4966  tgid:4966  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb535d84 r8:00000002 r7:60000013 r6:eb535d8c r5:8541c800
 r4:8541c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8541c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb535e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fdd80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8541c800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0f5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85484f8c r4:85484c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85484f8c r4:84dfcb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8541c800 r8:84dfcbac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dfcb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dfcb80 r8:80287e08 r7:eb529e60 r6:84dfcd00 r5:8541c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb535fb0 to 0xeb535ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852fdcc0
INFO: task kworker/1:624:4966 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9d4c0000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:625:4968 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:625   state:D stack:0     pid:4968  tgid:4968  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb539d84 r8:00000002 r7:60000013 r6:eb539d8c r5:8541d400
 r4:8541d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8541d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb539e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854611c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8541d400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb149000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85485f8c r4:85485c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85485f8c r4:84dfcd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8541d400 r8:84dfcdac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dfcd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dfcd80 r8:80287e08 r7:eb529e60 r6:84dfce80 r5:8541d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb539fb0 to 0xeb539ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845744c0
INFO: task kworker/1:625:4968 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9da8a000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:626:4970 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:626   state:D stack:0     pid:4970  tgid:4970  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb53dd84 r8:00000002 r7:60000013 r6:eb53dd8c r5:8541e000
 r4:8541e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8541e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb53de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84574240
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8541e000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb123000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8548578c r4:85485400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8548578c r4:84dfcc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8541e000 r8:84dfcc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dfcc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dfcc00 r8:80287e08 r7:eb539e60 r6:84dfcf80 r5:8541e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb53dfb0 to 0xeb53dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85461080
INFO: task kworker/1:626:4970 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9ddaa000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:627:4972 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:627   state:D stack:0     pid:4972  tgid:4972  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb541d84 r8:00000002 r7:60000013 r6:eb541d8c r5:8541ec00
 r4:8541ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8541ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb541e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8541ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb133000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85485b8c r4:85485800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85485b8c r4:852e3d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8541ec00 r8:852e3dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852e3d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852e3d80 r8:80287e08 r7:eb539e60 r6:852e3e80 r5:8541ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb541fb0 to 0xeb541ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85461280
INFO: task kworker/1:627:4972 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9ddaa000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:628:4974 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:628   state:D stack:0     pid:4974  tgid:4974  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb545d84 r8:00000002 r7:60000013 r6:eb545d8c r5:8541a400
 r4:8541a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8541a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb545e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461400
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8541a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb15f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8548638c r4:85486000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8548638c r4:852e3f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8541a400 r8:852e3fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852e3f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852e3f80 r8:80287e08 r7:eb539e60 r6:84dfce00 r5:8541a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb545fb0 to 0xeb545ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854612c0
INFO: task kworker/1:628:4974 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9de83000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:629:4976 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:629   state:D stack:0     pid:4976  tgid:4976  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb549d84 r8:00000002 r7:60000113 r6:eb549d8c r5:85420000
 r4:85420000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85420000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb549e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461880
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85420000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2d5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85486f8c r4:85486c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85486f8c r4:85465180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85420000 r8:854651ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85465180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85465180 r8:80287e08 r7:eb545e60 r6:85465000 r5:85420000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb549fb0 to 0xeb549ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854613c0
INFO: task kworker/1:629:4976 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9e2be000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:630:4977 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:630   state:D stack:0     pid:4977  tgid:4977  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb551d84 r8:00000002 r7:60000013 r6:eb551d8c r5:85420c00
 r4:85420c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85420c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb551e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854613c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85420c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb173000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8548678c r4:85486400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8548678c r4:85465100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85420c00 r8:8546512c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85465100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85465100 r8:80287e08 r7:eb549e60 r6:85465080 r5:85420c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb551fb0 to 0xeb551ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85461600
INFO: task kworker/1:630:4977 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9e36e000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:631:4980 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:631   state:D stack:0     pid:4980  tgid:4980  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb54dd84 r8:00000002 r7:60000013 r6:eb54dd8c r5:85421800
 r4:85421800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85421800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb54de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461780
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85421800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2c9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85486b8c r4:85486800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85486b8c r4:85465300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85421800 r8:8546532c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85465300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85465300 r8:80287e08 r7:eb549e60 r6:85465400 r5:85421800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb54dfb0 to 0xeb54dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85461740
INFO: task kworker/1:631:4980 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9e662000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:632:4982 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:632   state:D stack:0     pid:4982  tgid:4982  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb555d84 r8:00000002 r7:60000113 r6:eb555d8c r5:85423000
 r4:85423000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85423000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb555e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461ac0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85423000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2e3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8548738c r4:85487000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8548738c r4:85465200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85423000 r8:8546522c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85465200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85465200 r8:80287e08 r7:eb549e60 r6:85465480 r5:85423000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb555fb0 to 0xeb555ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85461800
INFO: task kworker/1:632:4982 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9e80c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:633:4984 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:633   state:D stack:0     pid:4984  tgid:4984  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb559d84 r8:00000002 r7:60000113 r6:eb559d8c r5:85423c00
 r4:85423c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85423c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb559e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461c40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85423c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2ed000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8548778c r4:85487400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8548778c r4:85465380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85423c00 r8:854653ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85465380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85465380 r8:80287e08 r7:eb555e60 r6:85465580 r5:85423c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb559fb0 to 0xeb559ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85461a80
INFO: task kworker/1:633:4984 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9eb8a000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:634:4986 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:634   state:D stack:0     pid:4986  tgid:4986  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb55dd84 r8:00000002 r7:60000013 r6:eb55dd8c r5:85424800
 r4:85424800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85424800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb55de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461c00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85424800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2f9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85487b8c r4:85487800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85487b8c r4:85465280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85424800 r8:854652ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85465280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85465280 r8:80287e08 r7:eb559e60 r6:85465600 r5:85424800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb55dfb0 to 0xeb55dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85461c00
INFO: task kworker/1:634:4986 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9edad000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:635:4988 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:635   state:D stack:0     pid:4988  tgid:4988  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb561d84 r8:00000002 r7:60000113 r6:eb561d8c r5:85425400
 r4:85425400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85425400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb561e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461ec0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85425400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb311000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85487f8c r4:85487c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85487f8c r4:85465680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85425400 r8:854656ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85465680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85465680 r8:80287e08 r7:eb55de60 r6:85465780 r5:85425400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb561fb0 to 0xeb561ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85461d00
INFO: task kworker/1:635:4988 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9f0d7000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:636:4990 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:636   state:D stack:0     pid:4990  tgid:4990  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb565d84 r8:00000002 r7:60000013 r6:eb565d8c r5:85426000
 r4:85426000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85426000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb565e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85426000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb34f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8549438c r4:85494000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8549438c r4:85465500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85426000 r8:8546552c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85465500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85465500 r8:80287e08 r7:eb561e60 r6:85465880 r5:85426000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb565fb0 to 0xeb565ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85475000
INFO: task kworker/1:636:4990 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9f5f3000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:637:4992 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:637   state:D stack:0     pid:4992  tgid:4992  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb569d84 r8:00000002 r7:60000113 r6:eb569d8c r5:85426c00
 r4:85426c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85426c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb569e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475240
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85426c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb365000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8549478c r4:85494400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8549478c r4:85465700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85426c00 r8:8546572c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85465700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85465700 r8:80287e08 r7:eb565e60 r6:85465800 r5:85426c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb569fb0 to 0xeb569ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85475000
INFO: task kworker/1:637:4992 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9f7f6000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:638:4994 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:638   state:D stack:0     pid:4994  tgid:4994  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb56dd84 r8:00000002 r7:60000013 r6:eb56dd8c r5:85422400
 r4:85422400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85422400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb56de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475380
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85422400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb3b9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85494b8c r4:85494800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85494b8c r4:85465900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85422400 r8:8546592c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85465900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85465900 r8:80287e08 r7:eb569e60 r6:85465a00 r5:85422400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb56dfb0 to 0xeb56dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85475200
INFO: task kworker/1:638:4994 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   9fb6c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:639:4996 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:639   state:D stack:0     pid:4996  tgid:4996  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb571d84 r8:00000002 r7:60000113 r6:eb571d8c r5:85428000
 r4:85428000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85428000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb571e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854756c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85428000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8549538c r4:85495000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8549538c r4:85465b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85428000 r8:85465bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85465b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85465b80 r8:80287e08 r7:eb56de60 r6:85465c00 r5:85428000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb571fb0 to 0xeb571ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854752c0
INFO: task kworker/1:639:4996 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a0247000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:640:4998 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:640   state:D stack:0     pid:4998  tgid:4998  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb575d84 r8:00000002 r7:60000113 r6:eb575d8c r5:85428c00
 r4:85428c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85428c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb575e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475500
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85428c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa65000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85494f8c r4:85494c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85494f8c r4:85465a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85428c00 r8:85465aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85465a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85465a80 r8:80287e08 r7:eb571e60 r6:85465c80 r5:85428c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb575fb0 to 0xeb575ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85475600
INFO: task kworker/1:640:4998 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a0247000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:641:5000 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:641   state:D stack:0     pid:5000  tgid:5000  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb579d84 r8:00000002 r7:60000113 r6:eb579d8c r5:85429800
 r4:85429800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85429800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb579e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475800
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85429800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06e7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8549578c r4:85495400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8549578c r4:85465d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85429800 r8:85465d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85465d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85465d00 r8:80287e08 r7:eb571e60 r6:85465e00 r5:85429800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb579fb0 to 0xeb579ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85475600
INFO: task kworker/1:641:5000 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a056c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:642:5002 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:642   state:D stack:0     pid:5002  tgid:5002  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb57dd84 r8:00000002 r7:60000113 r6:eb57dd8c r5:8542a400
 r4:8542a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8542a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb57de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854759c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8542a400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea9c1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85495b8c r4:85495800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85495b8c r4:85465980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8542a400 r8:854659ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85465980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85465980 r8:80287e08 r7:eb579e60 r6:85465b00 r5:8542a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb57dfb0 to 0xeb57dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85475740
INFO: task kworker/1:642:5002 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a0ae3000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:643:5004 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:643   state:D stack:0     pid:5004  tgid:5004  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb581d84 r8:00000002 r7:60000113 r6:eb581d8c r5:8542b000
 r4:8542b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8542b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb581e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475bc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8542b000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabf9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85339f8c r4:85339c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85339f8c r4:85465e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8542b000 r8:85465eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85465e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85465e80 r8:80287e08 r7:eb57de60 r6:85465d80 r5:8542b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb581fb0 to 0xeb581ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85475940
INFO: task kworker/1:643:5004 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a0dd7000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:644:5007 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:644   state:D stack:0     pid:5007  tgid:5007  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb58dd84 r8:00000002 r7:60000013 r6:eb58dd8c r5:8542d400
 r4:8542d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8542d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb58de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475e00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8542d400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac85000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85495f8c r4:85495c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85495f8c r4:85465f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8542d400 r8:85465fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85465f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85465f80 r8:80287e08 r7:eb581e60 r6:85465f00 r5:8542d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb58dfb0 to 0xeb58dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85475c80
INFO: task kworker/1:644:5007 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1234000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:645:5009 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:645   state:D stack:0     pid:5009  tgid:5009  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb589d84 r8:00000002 r7:60000113 r6:eb589d8c r5:8542bc00
 r4:8542bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8542bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb589e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475e80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8542bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead89000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8549638c r4:85496000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8549638c r4:85060100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8542bc00 r8:8506012c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85060100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85060100 r8:80287e08 r7:eb58de60 r6:85060180 r5:8542bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb589fb0 to 0xeb589ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85475dc0
INFO: task kworker/1:645:5009 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1595000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:646:5011 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:646   state:D stack:0     pid:5011  tgid:5011  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb595d84 r8:00000002 r7:60000113 r6:eb595d8c r5:85433c00
 r4:85433c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85433c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb595e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84574740
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85433c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadcb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8549678c r4:85496400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8549678c r4:85060280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85433c00 r8:850602ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85060280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85060280 r8:80287e08 r7:eb589e60 r6:852edc00 r5:85433c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb595fb0 to 0xeb595ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84574680
INFO: task kworker/1:646:5011 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1860000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:647:5013 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:647   state:D stack:0     pid:5013  tgid:5013  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb59dd84 r8:00000002 r7:60000113 r6:eb59dd8c r5:85436000
 r4:85436000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85436000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb59de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461e80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85436000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf9b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85496b8c r4:85496800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85496b8c r4:85060000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85436000 r8:8506002c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85060000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85060000 r8:80287e08 r7:eb595e60 r6:852edc80 r5:85436000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb59dfb0 to 0xeb59dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85475b80
INFO: task kworker/1:647:5013 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1c28000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:648:5015 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:648   state:D stack:0     pid:5015  tgid:5015  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5a1d84 r8:00000002 r7:60000113 r6:eb5a1d8c r5:85448000
 r4:85448000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85448000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85306240
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85448000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb163000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8549738c r4:85497000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8549738c r4:85060300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85448000 r8:8506032c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85060300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85060300 r8:80287e08 r7:eb59de60 r6:852edd80 r5:85448000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5a1fb0 to 0xeb5a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85461980
INFO: task kworker/1:648:5015 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1e86000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:649:5016 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:649   state:D stack:0     pid:5016  tgid:5016  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5a5d84 r8:00000002 r7:60000013 r6:eb5a5d8c r5:85448c00
 r4:85448c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85448c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853062c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85448c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb1af000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8549778c r4:85497400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8549778c r4:85060080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85448c00 r8:850600ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85060080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85060080 r8:80287e08 r7:eb5a1e60 r6:852ede00 r5:85448c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5a5fb0 to 0xeb5a5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85461980
INFO: task kworker/1:649:5016 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a1e86000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:650:5020 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:650   state:D stack:0     pid:5020  tgid:5020  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb599d84 r8:00000002 r7:60000013 r6:eb599d8c r5:8542e000
 r4:8542e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8542e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb599e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853067c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8542e000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb1fd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854a038c r4:854a0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854a038c r4:85060200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8542e000 r8:8506022c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85060200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85060200 r8:80287e08 r7:eb5a5e60 r6:85060380 r5:8542e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb599fb0 to 0xeb599ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85306500
INFO: task kworker/1:650:5020 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a21c0000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:651:5021 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:651   state:D stack:0     pid:5021  tgid:5021  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5a9d84 r8:00000002 r7:60000113 r6:eb5a9d8c r5:8542ec00
 r4:8542ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8542ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85306400
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8542ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb1db000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85497b8c r4:85497800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85497b8c r4:85060400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8542ec00 r8:8506042c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85060400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85060400 r8:80287e08 r7:eb599e60 r6:85060480 r5:8542ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5a9fb0 to 0xeb5a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85306500
INFO: task kworker/1:651:5021 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a2501000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:652:5024 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:652   state:D stack:0     pid:5024  tgid:5024  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5add84 r8:00000002 r7:60000113 r6:eb5add8c r5:8542c800
 r4:8542c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8542c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5ade08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85306640
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8542c800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb1e7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85497f8c r4:85497c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85497f8c r4:85060500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8542c800 r8:8506052c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85060500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85060500 r8:80287e08 r7:eb599e60 r6:85060680 r5:8542c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5adfb0 to 0xeb5adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85306600
INFO: task kworker/1:652:5024 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a2823000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:653:5026 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:653   state:D stack:0     pid:5026  tgid:5026  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5b1d84 r8:00000002 r7:60000013 r6:eb5b1d8c r5:846a6c00
 r4:846a6c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:846a6c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85306940
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:846a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb211000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854a078c r4:854a0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854a078c r4:85060580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:846a6c00 r8:850605ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85060580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85060580 r8:80287e08 r7:eb599e60 r6:85060780 r5:846a6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5b1fb0 to 0xeb5b1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85306780
INFO: task kworker/1:653:5026 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a2bb0000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:654:5028 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:654   state:D stack:0     pid:5028  tgid:5028  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5b5d84 r8:00000002 r7:60000113 r6:eb5b5d8c r5:85410000
 r4:85410000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85410000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85306a80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85410000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb22d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854a0b8c r4:854a0800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854a0b8c r4:85060600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85410000 r8:8506062c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85060600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85060600 r8:80287e08 r7:eb5b1e60 r6:85060880 r5:85410000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5b5fb0 to 0xeb5b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85306900
INFO: task kworker/1:654:5028 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a2f15000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:655:5031 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:655   state:D stack:0     pid:5031  tgid:5031  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5b9d84 r8:00000002 r7:60000113 r6:eb5b9d8c r5:85410c00
 r4:85410c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85410c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85306bc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85410c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb23d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854a0f8c r4:854a0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854a0f8c r4:85060700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85410c00 r8:8506072c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85060700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85060700 r8:80287e08 r7:eb5b5e60 r6:85060800 r5:85410c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5b9fb0 to 0xeb5b9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85306b00
INFO: task kworker/1:655:5031 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a337b000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:656:5033 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:656   state:D stack:0     pid:5033  tgid:5033  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5c1d84 r8:00000002 r7:60000113 r6:eb5c1d8c r5:85411800
 r4:85411800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85411800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85306d00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85411800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb261000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854a138c r4:854a1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854a138c r4:85060900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85411800 r8:8506092c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85060900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85060900 r8:80287e08 r7:eb5b9e60 r6:85060980 r5:85411800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5c1fb0 to 0xeb5c1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85306c40
INFO: task kworker/1:656:5033 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a3694000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:657:5034 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:657   state:D stack:0     pid:5034  tgid:5034  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb591d84 r8:00000002 r7:60000113 r6:eb591d8c r5:85412400
 r4:85412400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85412400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb591e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc000
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85412400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854a1f8c r4:854a1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854a1f8c r4:85060a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85412400 r8:85060a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85060a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85060a00 r8:80287e08 r7:eb5c1e60 r6:85060a80 r5:85412400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb591fb0 to 0xeb591ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85306c40
INFO: task kworker/1:657:5034 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a39ea000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:658:5036 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:658   state:D stack:0     pid:5036  tgid:5036  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5c5d84 r8:00000002 r7:60000113 r6:eb5c5d8c r5:85413000
 r4:85413000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85413000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85306f00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85413000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb271000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854a178c r4:854a1400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854a178c r4:85060b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85413000 r8:85060b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85060b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85060b00 r8:80287e08 r7:eb591e60 r6:85060c80 r5:85413000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5c5fb0 to 0xeb5c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85306ec0
INFO: task kworker/1:658:5036 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a3e12000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:659:5038 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:659   state:D stack:0     pid:5038  tgid:5038  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5c9d84 r8:00000002 r7:60000013 r6:eb5c9d8c r5:85413c00
 r4:85413c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85413c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85385ec0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85413c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb28b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854a1b8c r4:854a1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854a1b8c r4:85060b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85413c00 r8:85060bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85060b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85060b80 r8:80287e08 r7:eb591e60 r6:85060d00 r5:85413c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5c9fb0 to 0xeb5c9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847dc0c0
INFO: task kworker/1:659:5038 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a4068000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:660:5040 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:660   state:D stack:0     pid:5040  tgid:5040  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5cdd84 r8:00000002 r7:60000113 r6:eb5cdd8c r5:85414800
 r4:85414800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85414800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5cde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc240
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85414800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb3cb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854a238c r4:854a2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854a238c r4:85060d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85414800 r8:85060dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85060d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85060d80 r8:80287e08 r7:eb591e60 r6:85060c00 r5:85414800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5cdfb0 to 0xeb5cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847dc0c0
INFO: task kworker/1:660:5040 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a412d000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:661:5043 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:661   state:D stack:0     pid:5043  tgid:5043  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5d1d84 r8:00000002 r7:60000113 r6:eb5d1d8c r5:85415400
 r4:85415400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85415400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc380
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85415400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb3d5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854a278c r4:854a2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854a278c r4:85060e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85415400 r8:85060e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85060e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85060e00 r8:80287e08 r7:eb5cde60 r6:85060f00 r5:85415400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5d1fb0 to 0xeb5d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847dc200
INFO: task kworker/1:661:5043 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a4575000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:662:5044 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:662   state:D stack:0     pid:5044  tgid:5044  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5d5d84 r8:00000002 r7:60000013 r6:eb5d5d8c r5:85416000
 r4:85416000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85416000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dcb00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85416000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb449000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854a3b8c r4:854a3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854a3b8c r4:85060f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85416000 r8:85060fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85060f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85060f80 r8:80287e08 r7:eb5d1e60 r6:85060e80 r5:85416000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5d5fb0 to 0xeb5d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847dc2c0
INFO: task kworker/1:662:5044 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a4a22000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:663:5046 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:663   state:D stack:0     pid:5046  tgid:5046  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5d9d84 r8:00000002 r7:60000013 r6:eb5d9d8c r5:85416c00
 r4:85416c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85416c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc540
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85416c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb3e3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854a2b8c r4:854a2800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854a2b8c r4:84fa5100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85416c00 r8:84fa512c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fa5100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fa5100 r8:80287e08 r7:eb5d5e60 r6:84fa5180 r5:85416c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5d9fb0 to 0xeb5d9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847dc500
INFO: task kworker/1:663:5046 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a4d28000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:664:5048 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:664   state:D stack:0     pid:5048  tgid:5048  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5e1d84 r8:00000002 r7:60000013 r6:eb5e1d8c r5:854f0000
 r4:854f0000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:854f0000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc680
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:854f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb423000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854a2f8c r4:854a2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854a2f8c r4:84fa5000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:854f0000 r8:84fa502c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fa5000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fa5000 r8:80287e08 r7:eb5d5e60 r6:84fa5280 r5:854f0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5e1fb0 to 0xeb5e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847dc5c0
INFO: task kworker/1:664:5048 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a50b3000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:665:5050 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:665   state:D stack:0     pid:5050  tgid:5050  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5e5d84 r8:00000002 r7:60000013 r6:eb5e5d8c r5:854f0c00
 r4:854f0c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:854f0c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc800
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:854f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb431000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854a338c r4:854a3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854a338c r4:84fa5080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:854f0c00 r8:84fa50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fa5080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fa5080 r8:80287e08 r7:eb5d5e60 r6:84fa5380 r5:854f0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5e5fb0 to 0xeb5e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847dc7c0
INFO: task kworker/1:665:5050 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a50b3000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:84e0be80
 r4:84d87ac0
 r4:854f1800
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc980
 r7:ddde2d80 r6:83018200 r5:854a378c r4:84fa5200
INFO: task kworker/1:666:5052 is blocked on a mutex likely owned by task kworker/0:123:3540.
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
 r4:84d87ac0
 r5:854f2400 r4:8291a680
 r9:83018205 r8:854f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:854f2400 r8:84fa532c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fa5300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fa5300 r8:80287e08 r7:eb5d5e60 r6:84fa5580 r5:854f2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5ddfb0 to 0xeb5ddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847dcac0
INFO: task kworker/1:667:5054 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a5dda000 dfeb5000 00000001 80239b98 7f081000 00000001
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r5:854a3f8c r4:854a3c00
 r10:00000000 r9:84fa5400 r8:80287e08 r7:eb5dde60 r6:84fa5500 r5:854f3000
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
INFO: task kworker/1:669:5058 blocked for more than 469 seconds.
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f88000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Call trace: 
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
 r4:854f5400
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f88140
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:854f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb603000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854a8b8c r4:854a8800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854a8b8c r4:84fa5680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:854f5400 r8:84fa56ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:671:5062 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:671   state:D stack:0     pid:5062  tgid:5062  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb601d84 r8:00000002 r7:60000113 r6:eb601d8c r5:854f6000
 r4:854f6000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:854f6000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb601e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f88340
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:854f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb609000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854a8f8c r4:854a8c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854a8f8c r4:84fa5880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:854f6000 r8:84fa58ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fa5880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fa5880 r8:80287e08 r7:eb5f1e60 r6:84fa5700 r5:854f6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb601fb0 to 0xeb601ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f88080
INFO: task kworker/1:671:5062 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a69d0000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:672:5064 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:672   state:D stack:0     pid:5064  tgid:5064  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb60dd84 r8:00000002 r7:60000013 r6:eb60dd8c r5:854f6c00
 r4:854f6c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:854f6c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb60de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f88300
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:854f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb617000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854a938c r4:854a9000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854a938c r4:84fa5900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:854f6c00 r8:84fa592c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fa5900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fa5900 r8:80287e08 r7:eb601e60 r6:84fa5a80 r5:854f6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb60dfb0 to 0xeb60dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f88300
INFO: task kworker/1:672:5064 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a6d1b000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:673:5067 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:673   state:D stack:0     pid:5067  tgid:5067  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb615d84 r8:00000002 r7:60000013 r6:eb615d8c r5:854f3c00
 r4:854f3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:854f3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb615e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f88740
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:854f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb62b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854a9b8c r4:854a9800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854a9b8c r4:84fa5980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:854f3c00 r8:84fa59ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fa5980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fa5980 r8:80287e08 r7:eb60de60 r6:84fa5a00 r5:854f3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb615fb0 to 0xeb615ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f88540
INFO: task kworker/1:673:5067 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a6d1b000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:674:5068 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:674   state:D stack:0     pid:5068  tgid:5068  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb629d84 r8:00000002 r7:60000013 r6:eb629d8c r5:854f8000
 r4:854f8000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:854f8000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb629e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854a978c r4:854a9400
 r7:ddde2d80 r6:83018200 r5:854a978c r4:84fa5b00
 r10:00000000 r9:84fa5b00 r8:80287e08 r7:eb615e60 r6:84fa5b80 r5:854f8000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:675:5071 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:675   state:D stack:0     pid:5071  tgid:5071  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r10:8291a684 r9:eb635d84 r8:00000002 r7:60000013 r6:eb635d8c r5:854f8c00
 r4:00000000
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:854aab8c r4:854aa800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:854f8c00 r8:84fa5c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
task:kworker/1:676   state:D stack:0     pid:5073  tgid:5073  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb63de08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:854a9f8c r4:854a9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854a9f8c r4:84fa5c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:854f9800 r8:84fa5cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fa5c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fa5c80 r8:80287e08 r7:eb635e60 r6:84fa5e80 r5:854f9800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb63dfb0 to 0xeb63dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f888c0
INFO: task kworker/1:676:5073 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a7a8f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:677:5075 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:ddde2d80 r6:83018200 r5:854aa38c r4:84fa5d00
 r10:00000000 r9:84fa5d00 r8:80287e08 r7:eb635e60 r6:84fa5e00 r5:854fb000
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r5:00001000 r4:dfa13000
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb649d84 r8:00000002 r7:60000113 r6:eb649d8c r5:85449800
 r4:85449800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85449800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb649e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d523c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85449800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb659000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8533ab8c r4:8533a800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8533ab8c r4:852ede80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85449800 r8:852edeac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:852ede80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852ede80 r8:80287e08 r7:eb495e60 r6:852edf00 r5:85449800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb649fb0 to 0xeb649ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d52600
INFO: task kworker/0:296:5076 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a7e5f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:297:5078 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:297   state:D stack:0     pid:5078  tgid:5078  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb65dd84 r8:00000002 r7:60000113 r6:eb65dd8c r5:8544b000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb65de08
 r9:83018005 r8:8544b000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
 r5:8533b78c r4:8533b400
 r7:dddced80 r6:83018000 r5:8533b78c r4:84d85000
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace: 
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:678:5079 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:678   state:D stack:0     pid:5079  tgid:5079  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb621d84 r8:00000002 r7:60000013 r6:eb621d8c r5:8544c800
 r4:8544c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8544c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb621e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f88fc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8544c800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e002f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854aa78c r4:854aa400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854aa78c r4:84fa5f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8544c800 r8:84fa5f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fa5f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fa5f00 r8:80287e08 r7:eb635e60 r6:84d85100 r5:8544c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb621fb0 to 0xeb621ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:298:5084 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:298   state:D stack:0     pid:5084  tgid:5084  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4d9d84 r8:00000002 r7:60000113 r6:eb4d9d8c r5:8544ec00
 r4:8544ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8544ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f60e00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8544ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb02b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854b538c r4:854b5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:854b538c r4:84d85180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8544ec00 r8:84d851ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84d85180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d85180 r8:80287e08 r7:eb65de60 r6:84d85300 r5:8544ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4d9fb0 to 0xeb4d9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d84040
INFO: task kworker/0:298:5084 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a8a45000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:679:5086 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:679   state:D stack:0     pid:5086  tgid:5086  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb66dd84 r8:00000002 r7:60000113 r6:eb66dd8c r5:8544d400
 r4:8544d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8544d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb66de08
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r4:00000000
 r5:00001000 r4:e4889000
 r5:854aaf8c r4:854aac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854aaf8c r4:84d5b080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8544d400 r8:84d5b0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r10:00000000 r9:84d5b080 r8:80287e08 r7:eb635e60 r6:84d85200 r5:8544d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb66dfb0 to 0xeb66dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f60100
INFO: task kworker/1:679:5086 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a8f08000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:680:5087 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:680   state:D stack:0     pid:5087  tgid:5087  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb671d84 r8:00000002 r7:60000013 r6:eb671d8c r5:8544a400
 r4:8544a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8544a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb671e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f609c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8544a400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaed9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854b478c r4:854b4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854b478c r4:84d5b100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8544a400 r8:84d5b12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d5b100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d5b100 r8:80287e08 r7:eb66de60 r6:84d85280 r5:8544a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb671fb0 to 0xeb671ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f60100
INFO: task kworker/1:680:5087 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a9229000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:681:5089 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:681   state:D stack:0     pid:5089  tgid:5089  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb679d84 r8:00000002 r7:60000013 r6:eb679d8c r5:84e98c00
 r4:84e98c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84e98c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb679e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f60280
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84e98c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab2b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854ab38c r4:854ab000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854ab38c r4:84d5b200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84e98c00 r8:84d5b22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d5b200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d5b200 r8:80287e08 r7:eb671e60 r6:84d85380 r5:84e98c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb679fb0 to 0xeb679ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f60100
INFO: task kworker/1:681:5089 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a9229000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:00000000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:682:5091 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:682   state:D stack:0     pid:5091  tgid:5091  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb67dd84 r8:00000002 r7:60000113 r6:eb67dd8c r5:84e99800
 r4:84e99800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84e99800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb67de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f60480
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84e99800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead2b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854ab78c r4:854ab400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854ab78c r4:84d5b180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84e99800 r8:84d5b1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d5b180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d5b180 r8:80287e08 r7:eb671e60 r6:84d85400 r5:84e99800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb67dfb0 to 0xeb67dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f601c0
INFO: task kworker/1:682:5091 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a9700000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:683:5092 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:683   state:D stack:0     pid:5092  tgid:5092  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb681d84 r8:00000002 r7:60000113 r6:eb681d8c r5:84e9a400
 r4:84e9a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84e9a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb681e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f605c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84e9a400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae35000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854abb8c r4:854ab800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854abb8c r4:84d5b300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84e9a400 r8:84d5b32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d5b300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d5b300 r8:80287e08 r7:eb671e60 r6:84d85480 r5:84e9a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb681fb0 to 0xeb681ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f606c0
INFO: task kworker/1:683:5092 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a99c5000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018205 r8:84e9b000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
 r7:ddde2d80 r6:83018200 r5:854abf8c r4:84d5b380
 r4:84d5b380
 r10:00000000 r9:84d5b380 r8:80287e08 r7:eb671e60 r6:84d85500 r5:84e9b000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a99c5000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:685:5098 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:685   state:D stack:0     pid:5098  tgid:5098  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb689d84 r8:00000002 r7:60000013 r6:eb689d8c r5:84e9bc00
 r4:84e9bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84e9bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb689e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f607c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84e9bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaea5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854b438c r4:854b4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854b438c r4:84d5b000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84e9bc00 r8:84d5b02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d5b000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d5b000 r8:80287e08 r7:eb671e60 r6:84d85580 r5:84e9bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb689fb0 to 0xeb689ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f60ac0
INFO: task kworker/1:685:5098 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a9be7000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:686:5099 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:686   state:D stack:0     pid:5099  tgid:5099  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb68dd84 r8:00000002 r7:60000013 r6:eb68dd8c r5:84e9c800
 r4:84e9c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84e9c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb68de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f60b00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84e9c800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf2d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854b4b8c r4:854b4800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854b4b8c r4:84d5b280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84e9c800 r8:84d5b2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d5b280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d5b280 r8:80287e08 r7:eb671e60 r6:84d85600 r5:84e9c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb68dfb0 to 0xeb68dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f60840
INFO: task kworker/1:686:5099 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a9d5f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:687:5101 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:687   state:D stack:0     pid:5101  tgid:5101  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb691d84 r8:00000002 r7:60000013 r6:eb691d8c r5:84e9d400
 r4:84e9d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84e9d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb691e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f60c80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84e9d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb013000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854b4f8c r4:854b4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854b4f8c r4:84d5b400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84e9d400 r8:84d5b42c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d5b400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d5b400 r8:80287e08 r7:eb68de60 r6:84d85680 r5:84e9d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb691fb0 to 0xeb691ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f60a40
INFO: task kworker/1:687:5101 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   a9f98000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:688:5103 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:688   state:D stack:0     pid:5103  tgid:5103  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb695d84 r8:00000002 r7:60000013 r6:eb695d8c r5:84e9e000
 r4:84e9e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84e9e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb695e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f60f00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84e9e000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb049000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854b578c r4:854b5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854b578c r4:84d5b580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84e9e000 r8:84d5b5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d5b580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d5b580 r8:80287e08 r7:eb691e60 r6:84d85700 r5:84e9e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb695fb0 to 0xeb695ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f60c40
INFO: task kworker/1:688:5103 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   aa268000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:689:5106 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:689   state:D stack:0     pid:5106  tgid:5106  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb675d84 r8:00000002 r7:60000113 r6:eb675d8c r5:84e9ec00
 r4:84e9ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84e9ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb675e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f88ec0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84e9ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb065000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854b5b8c r4:854b5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854b5b8c r4:84d5b600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84e9ec00 r8:84d5b62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d5b600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d5b600 r8:80287e08 r7:eb695e60 r6:84d85780 r5:84e9ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb675fb0 to 0xeb675ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f60800
INFO: task kworker/1:689:5106 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   aa268000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:690:5108 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:690   state:D stack:0     pid:5108  tgid:5108  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb699d84 r8:00000002 r7:60000013 r6:eb699d8c r5:84e98000
 r4:84e98000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84e98000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb699e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d83040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84e98000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0a5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854b5f8c r4:854b5c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854b5f8c r4:84d5b500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84e98000 r8:84d5b52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d5b500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d5b500 r8:80287e08 r7:eb675e60 r6:84d85800 r5:84e98000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb699fb0 to 0xeb699ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f60f80
INFO: task kworker/1:690:5108 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   aa4af000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:299:5109 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:299   state:D stack:0     pid:5109  tgid:5109  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb69dd84 r8:00000002 r7:60000113 r6:eb69dd8c r5:8544bc00
 r4:8544bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8544bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb69de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r4:00000000
 r5:00001000 r4:eb0eb000
 r5:8533b38c r4:8533b000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:8544bc00 r8:84d858ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84d85880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d85880 r8:80287e08 r7:eb65de60 r6:84d85900 r5:8544bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb69dfb0 to 0xeb69dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d84b80
INFO: task kworker/0:299:5109 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   aa556000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:691:5111 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:691   state:D stack:0     pid:5111  tgid:5111  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb665d84 r8:00000002 r7:60000013 r6:eb665d8c r5:854fc800
 r4:854fc800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:854fc800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb665e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d83280
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:854fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0cd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854b638c r4:854b6000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854b638c r4:84d5b700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:854fc800 r8:84d5b72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d5b700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d5b700 r8:80287e08 r7:eb699e60 r6:84d5b780 r5:854fc800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb665fb0 to 0xeb665ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:82ac21e4
 r4:00000000
 r5:00001000 r4:dfa13000
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:692:5112 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:692   state:D stack:0     pid:5112  tgid:5112  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6a1d84 r8:00000002 r7:60000113 r6:eb6a1d8c r5:854fd400
 r4:854fd400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:854fd400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d83500
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:854fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb103000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854b678c r4:854b6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854b678c r4:84d5b680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:854fd400 r8:84d5b6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d5b680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d5b680 r8:80287e08 r7:eb665e60 r6:84d5b880 r5:854fd400
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:00000000
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:693:5117 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:693   state:D stack:0     pid:5117  tgid:5117  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r4:854fa400
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a5e08
 r4:00000000
 r5:854b6b8c r4:854b6800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
5fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   aae82000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:694:5118 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:694   state:D stack:0     pid:5118  tgid:5118  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4bdd84 r8:00000002 r7:60000113 r6:eb4bdd8c r5:854fec00
 r4:854fec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:854fec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4bde08
 r4:00000000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d837c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:854fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb147000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854b6f8c r4:854b6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854b6f8c r4:84d5b980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:854fec00 r8:84d5b9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d5b980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d5b980 r8:80287e08 r7:eb6a5e60 r6:84d5ba80 r5:854fec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4bdfb0 to 0xeb4bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d83840
INFO: task kworker/1:694:5118 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ab101000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:695:5120 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:695   state:D stack:0     pid:5120  tgid:5120  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6a9d84 r8:00000002 r7:60000013 r6:eb6a9d8c r5:854fe000
 r4:854fe000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:854fe000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d83940
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:854fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb161000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854b738c r4:854b7000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854b738c r4:84d5b800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:854fe000 r8:84d5b82c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d5b800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d5b800 r8:80287e08 r7:eb4bde60 r6:84d5ba00 r5:854fe000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6a9fb0 to 0xeb6a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d83680
INFO: task kworker/1:695:5120 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ab220000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:696:5122 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:696   state:D stack:0     pid:5122  tgid:5122  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6b1d84 r8:00000002 r7:60000013 r6:eb6b1d8c r5:85500000
 r4:85500000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85500000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d83a80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85500000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854b778c r4:854b7400
 r7:ddde2d80 r6:83018200 r5:854b778c r4:84d5bb00
 r10:00000000 r9:84d5bb00 r8:80287e08 r7:eb6a9e60 r6:84d5bc00 r5:85500000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ab81a000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:697:5124 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:697   state:D stack:0     pid:5124  tgid:5124  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6b5d84 r8:00000002 r7:60000113 r6:eb6b5d8c r5:85500c00
 r4:85500c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85500c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d83dc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85500c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb303000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854b7b8c r4:854b7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854b7b8c r4:84d5bc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85500c00 r8:84d5bcac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d5bc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d5bc80 r8:80287e08 r7:eb6b1e60 r6:84d5bb80 r5:85500c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6b5fb0 to 0xeb6b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d839c0
INFO: task kworker/1:697:5124 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   abbd7000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:300:5126 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:300   state:D stack:0     pid:5126  tgid:5126  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6add84 r8:00000002 r7:60000113 r6:eb6add8c r5:84d10c00
 r4:84d10c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d10c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ade08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r4:00000000
 r5:00001000 r4:eb2eb000
 r5:8533bb8c r4:8533b800
 r7:dddced80 r6:83018000 r5:8533bb8c r4:84d85980
 r10:61c88647 r9:84d10c00 r8:84d859ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84d85980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d85980 r8:80287e08 r7:eb65de60 r6:84d85a00 r5:84d10c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6adfb0 to 0xeb6adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ac0c8000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:301:5127 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:301   state:D stack:0     pid:5127  tgid:5127  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6b9d84 r8:00000002 r7:60000113 r6:eb6b9d8c r5:84d11800
 r4:84d11800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d11800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85464400
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d11800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb329000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8533bf8c r4:8533bc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8533bf8c r4:84d85a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d11800 r8:84d85aac r7:82804d40 r6:dddced80 r5:dddceda0
 r10:00000000 r9:84d85a80 r8:80287e08 r7:eb6ade60 r6:84d85b00 r5:84d11800
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ac359000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:698:5130 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:698   state:D stack:0     pid:5130  tgid:5130  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6c5d84 r8:00000002 r7:60000013 r6:eb6c5d8c r5:84d12400
 r4:84d12400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d12400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f60f80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d12400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb3c1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854bc38c r4:854bc000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854bc38c r4:84d5bd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d12400 r8:84d5bd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d5bd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d5bd00 r8:80287e08 r7:eb6b5e60 r6:84d85b80 r5:84d12400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6c5fb0 to 0xeb6c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d83d80
INFO: task kworker/1:698:5130 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r4:82ac21e4
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:302:5131 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:302   state:D stack:0     pid:5131  tgid:5131  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6c9d84 r8:00000002 r7:60000013 r6:eb6c9d8c r5:84d13c00
 r4:84d13c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d13c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c2000
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d13c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854cc38c r4:854cc000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:854cc38c r4:84d85c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d13c00 r8:84d85c2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84d85c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d85c00 r8:80287e08 r7:eb6b9e60 r6:84d85c80 r5:84d13c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6c9fb0 to 0xeb6c9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85464200
INFO: task kworker/0:302:5131 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   acbd5000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:303:5133 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:303   state:D stack:0     pid:5133  tgid:5133  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6cdd84 r8:00000002 r7:60000113 r6:eb6cdd8c r5:84d13000
 r4:84d13000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d13000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6cde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85464c40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d13000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea9c9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8466a38c r4:8466a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8466a38c r4:84d85d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d13000 r8:84d85d2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84d85d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d85d00 r8:80287e08 r7:eb6c9e60 r6:84d85e80 r5:84d13000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6cdfb0 to 0xeb6cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85464100
INFO: task kworker/0:303:5133 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ad18b000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:699:5134 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:699   state:D stack:0     pid:5134  tgid:5134  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6d1d84 r8:00000002 r7:60000013 r6:eb6d1d8c r5:84d15400
 r4:84d15400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d15400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d83f00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d15400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb38d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854b7f8c r4:854b7c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854b7f8c r4:84d5be00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d15400 r8:84d5be2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d5be00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d5be00 r8:80287e08 r7:eb6c5e60 r6:84d85d80 r5:84d15400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6d1fb0 to 0xeb6d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d83d40
INFO: task kworker/1:699:5134 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ad18b000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:700:5137 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:700   state:D stack:0     pid:5137  tgid:5137  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6ddd84 r8:00000002 r7:60000013 r6:eb6ddd8c r5:84d16c00
 r4:84d16c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d16c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6dde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfd600
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d16c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb4fb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854bd78c r4:854bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854bd78c r4:84d5be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d16c00 r8:84d5beac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d5be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d5be80 r8:80287e08 r7:eb6c5e60 r6:84d85e00 r5:84d16c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6ddfb0 to 0xeb6ddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dfd000
INFO: task kworker/1:700:5137 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   adf1d000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:701:5139 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:701   state:D stack:0     pid:5139  tgid:5139  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6e5d84 r8:00000002 r7:60000013 r6:eb6e5d8c r5:84d16000
 r4:84d16000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d16000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfd040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d16000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb4a3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854bc78c r4:854bc400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854bc78c r4:84d5bd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d16000 r8:84d5bdac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d5bd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d5bd80 r8:80287e08 r7:eb6dde60 r6:84d85f00 r5:84d16000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6e5fb0 to 0xeb6e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dfd000
INFO: task kworker/1:701:5139 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   adf1d000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:702:5140 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:702   state:D stack:0     pid:5140  tgid:5140  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6e9d84 r8:00000002 r7:60000113 r6:eb6e9d8c r5:84d14800
 r4:84d14800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d14800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfd1c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d14800 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb4b5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854bcb8c r4:854bc800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854bcb8c r4:84d5bf00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d14800 r8:84d5bf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d5bf00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d5bf00 r8:80287e08 r7:eb6dde60 r6:84d85f80 r5:84d14800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6e9fb0 to 0xeb6e9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dfd240
INFO: task kworker/1:702:5140 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   adf1d000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:703:5142 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:703   state:D stack:0     pid:5142  tgid:5142  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6f1d84 r8:00000002 r7:60000013 r6:eb6f1d8c r5:84d10000
 r4:84d10000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d10000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfd2c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d10000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb4db000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854bcf8c r4:854bcc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854bcf8c r4:852ff000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d10000 r8:852ff02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852ff000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852ff000 r8:80287e08 r7:eb6dde60 r6:852edf80 r5:84d10000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6f1fb0 to 0xeb6f1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dfd180
INFO: task kworker/1:703:5142 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ae48a000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:704:5144 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:704   state:D stack:0     pid:5144  tgid:5144  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6f9d84 r8:00000002 r7:60000113 r6:eb6f9d8c r5:85458c00
 r4:85458c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85458c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfd480
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85458c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb4e5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854bd38c r4:854bd000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854bd38c r4:852ff080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85458c00 r8:852ff0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852ff080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852ff080 r8:80287e08 r7:eb6dde60 r6:852edb80 r5:85458c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6f9fb0 to 0xeb6f9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dfd300
INFO: task kworker/1:704:5144 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   aecc2000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:705:5146 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:705   state:D stack:0     pid:5146  tgid:5146  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb625d84 r8:00000002 r7:60000113 r6:eb625d8c r5:85459800
 r4:85459800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85459800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb625e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfd9c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85459800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eacb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854be38c r4:854be000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854be38c r4:852ff180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85459800 r8:852ff1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852ff180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852ff180 r8:80287e08 r7:eb6dde60 r6:852edd00 r5:85459800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb625fb0 to 0xeb625ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dfd5c0
INFO: task kworker/1:705:5146 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   aecc2000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:706:5149 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:706   state:D stack:0     pid:5149  tgid:5149  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6f5d84 r8:00000002 r7:60000013 r6:eb6f5d8c r5:8545a400
 r4:8545a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8545a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfd780
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8545a400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0135000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854bdb8c r4:854bd800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854bdb8c r4:852ff280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8545a400 r8:852ff2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852ff280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852ff280 r8:80287e08 r7:eb625e60 r6:85363000 r5:8545a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6f5fb0 to 0xeb6f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dfd740
INFO: task kworker/1:706:5149 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   af438000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:707:5153 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:707   state:D stack:0     pid:5153  tgid:5153  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6bdd84 r8:00000002 r7:60000013 r6:eb6bdd8c r5:8545b000
 r4:8545b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8545b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6bde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfd940
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8545b000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabdd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854bdf8c r4:854bdc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854bdf8c r4:852ff300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8545b000 r8:852ff32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852ff300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852ff300 r8:80287e08 r7:eb625e60 r6:85363180 r5:8545b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6bdfb0 to 0xeb6bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dfd900
INFO: task kworker/1:707:5153 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   af62a000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:8545bc00 r8:8536322c r7:82804d40 r6:dddced80 r5:dddceda0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:708:5156 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:708   state:D stack:0     pid:5156  tgid:5156  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb705d84 r8:00000002 r7:60000113 r6:eb705d8c r5:8545d400
 r4:8545d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8545d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb705e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfdac0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8545d400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadc3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854be78c r4:854be400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854be78c r4:852ff380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8545d400 r8:852ff3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852ff380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852ff380 r8:80287e08 r7:eb625e60 r6:85363100 r5:8545d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb705fb0 to 0xeb705ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dfd740
INFO: task kworker/1:708:5156 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b00c3000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:00001000 r4:dfa13000
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
 r5:854bf38c r4:854bf000
 r7:ddde2d80 r6:83018200 r5:854bf38c r4:852ff100
 r10:00000000 r9:852ff100 r8:80287e08 r7:eb705e60 r6:85363280 r5:8545c800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:710:5160 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:710   state:D stack:0     pid:5160  tgid:5160  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb715d84 r8:00000002 r7:60000013 r6:eb715d8c r5:8545e000
 r4:8545e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8545e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb715e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfdc80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8545e000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf9d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854beb8c r4:854be800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854beb8c r4:852ff480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8545e000 r8:852ff4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852ff480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852ff480 r8:80287e08 r7:eb711e60 r6:85363300 r5:8545e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb715fb0 to 0xeb715ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84dfdbc0
INFO: task kworker/1:710:5160 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b0551000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:711:5161 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:711   state:D stack:0     pid:5161  tgid:5161  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6c1d84 r8:00000002 r7:60000113 r6:eb6c1d8c r5:85501800
 r4:85501800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85501800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfde00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85501800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eafff000
 r5:854bef8c r4:854bec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:85501800 r8:852ff42c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:82ac21e4
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
 r10:8291a684 r9:eb70dd84 r8:00000002 r7:60000113 r6:eb70dd8c r5:85502400
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85464200
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85502400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb1e1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854bf78c r4:854bf400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854bf78c r4:852ff200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85502400 r8:852ff22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852ff200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852ff200 r8:80287e08 r7:eb711e60 r6:852ff600 r5:85502400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb70dfb0 to 0xeb70dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85464680
INFO: task kworker/1:712:5164 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b0c0c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
task:kworker/1:713   state:D stack:0     pid:5166  tgid:5166  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb701e08
 r9:83018205 r8:85503c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
 r5:854bfb8c r4:854bf800
 r10:61c88647 r9:85503c00 r8:852ff6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85464680
INFO: task kworker/1:713:5166 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b0c0c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb71de08
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r5:8536438c r4:85364000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:852ff700
Exception stack(0xeb71dfb0 to 0xeb71dff8)
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r4:dffe1dc0
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r5:85ef9f8c r4:85ef9c00
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:00000001
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:715:5170 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:715   state:D stack:0     pid:5170  tgid:5170  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb729d84 r8:00000002 r7:60000013 r6:eb729d8c r5:85505400
 r4:85505400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85505400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb729e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85383140
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85505400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb223000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854bff8c r4:854bfc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854bff8c r4:852ff880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85505400 r8:852ff8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852ff880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852ff880 r8:80287e08 r7:eb71de60 r6:852ff980 r5:85505400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb729fb0 to 0xeb729ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85383100
INFO: task kworker/1:715:5170 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b11df000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:716:5171 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:716   state:D stack:0     pid:5171  tgid:5171  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb721d84 r8:00000002 r7:60000013 r6:eb721d8c r5:85506000
 r4:85506000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85506000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb721e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85383500
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85506000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb26f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8536478c r4:85364400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8536478c r4:852ff780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85506000 r8:852ff7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852ff780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852ff780 r8:80287e08 r7:eb71de60 r6:852ff900 r5:85506000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb721fb0 to 0xeb721ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85383100
INFO: task kworker/1:716:5171 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b15ce000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:717:5174 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:717   state:D stack:0     pid:5174  tgid:5174  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb72dd84 r8:00000002 r7:60000113 r6:eb72dd8c r5:85506c00
 r4:85506c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85506c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb72de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85383580
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85506c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb28d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85364b8c r4:85364800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85364b8c r4:852ffa00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85506c00 r8:852ffa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852ffa00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852ffa00 r8:80287e08 r7:eb721e60 r6:852ffb00 r5:85506c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb72dfb0 to 0xeb72dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853834c0
INFO: task kworker/1:717:5174 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b187b000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:718:5176 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:718   state:D stack:0     pid:5176  tgid:5176  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb739d84 r8:00000002 r7:60000013 r6:eb739d8c r5:85458000
 r4:85458000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85458000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb739e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85383780
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85458000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2bb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85364f8c r4:85364c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85364f8c r4:852ffb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85458000 r8:852ffbac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852ffb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852ffb80 r8:80287e08 r7:eb72de60 r6:85363380 r5:85458000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb739fb0 to 0xeb739ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853835c0
INFO: task kworker/1:718:5176 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b1ca2000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:719:5178 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:719   state:D stack:0     pid:5178  tgid:5178  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb741d84 r8:00000002 r7:60000113 r6:eb741d8c r5:83878000
 r4:83878000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83878000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb741e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85383900
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83878000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb3db000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8536538c r4:85365000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8536538c r4:852ffa80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83878000 r8:852ffaac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852ffa80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852ffa80 r8:80287e08 r7:eb739e60 r6:85363400 r5:83878000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb741fb0 to 0xeb741ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85383740
INFO: task kworker/1:719:5178 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b1ca2000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:720:5180 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:720   state:D stack:0     pid:5180  tgid:5180  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb749d84 r8:00000002 r7:60000013 r6:eb749d8c r5:83879800
 r4:83879800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83879800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb749e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85383d00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83879800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb447000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85365f8c r4:85365c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85365f8c r4:852ffd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83879800 r8:852ffd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852ffd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852ffd00 r8:80287e08 r7:eb741e60 r6:85363480 r5:83879800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb749fb0 to 0xeb749ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853838c0
INFO: task kworker/1:720:5180 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b219f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:721:5182 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:721   state:D stack:0     pid:5182  tgid:5182  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb751d84 r8:00000002 r7:60000113 r6:eb751d8c r5:8387b000
 r4:8387b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8387b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb751e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85383a40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8387b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb3fd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8536578c r4:85365400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8536578c r4:852ffd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8387b000 r8:852ffdac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852ffd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852ffd80 r8:80287e08 r7:eb749e60 r6:85363500 r5:8387b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb751fb0 to 0xeb751ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853838c0
INFO: task kworker/1:721:5182 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b2347000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:722:5183 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:722   state:D stack:0     pid:5183  tgid:5183  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb755d84 r8:00000002 r7:60000113 r6:eb755d8c r5:83878c00
 r4:83878c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83878c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb755e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85383bc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83878c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb435000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85365b8c r4:85365800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85365b8c r4:852ffe00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83878c00 r8:852ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852ffe00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852ffe00 r8:80287e08 r7:eb749e60 r6:85363580 r5:83878c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb755fb0 to 0xeb755ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853838c0
INFO: task kworker/1:722:5183 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b2633000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:723:5187 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:723   state:D stack:0     pid:5187  tgid:5187  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb75dd84 r8:00000002 r7:60000013 r6:eb75dd8c r5:8387c800
 r4:8387c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8387c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb75de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85383d80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8387c800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb477000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8536638c r4:85366000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8536638c r4:852ffc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8387c800 r8:852ffc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852ffc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852ffc00 r8:80287e08 r7:eb749e60 r6:85363600 r5:8387c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb75dfb0 to 0xeb75dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85383c40
INFO: task kworker/1:723:5187 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b2633000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:724:5188 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:724   state:D stack:0     pid:5188  tgid:5188  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb761d84 r8:00000002 r7:60000113 r6:eb761d8c r5:8387d400
 r4:8387d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8387d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb761e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853721c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8387d400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb585000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85366f8c r4:85366c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85366f8c r4:852ffc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8387d400 r8:852ffcac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852ffc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852ffc80 r8:80287e08 r7:eb75de60 r6:85363680 r5:8387d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb761fb0 to 0xeb761ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85383dc0
INFO: task kworker/1:724:5188 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b29e1000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:725:5189 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:725   state:D stack:0     pid:5189  tgid:5189  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb765d84 r8:00000002 r7:60000013 r6:eb765d8c r5:8387e000
 r4:8387e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8387e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb765e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853838c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8387e000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb4fd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8536678c r4:85366400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8536678c r4:84d5bf80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8387e000 r8:84d5bfac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84d5bf80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84d5bf80 r8:80287e08 r7:eb761e60 r6:85363700 r5:8387e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb765fb0 to 0xeb765ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85383dc0
INFO: task kworker/1:725:5189 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b2d2a000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:726:5194 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:726   state:D stack:0     pid:5194  tgid:5194  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb76dd84 r8:00000002 r7:60000113 r6:eb76dd8c r5:8387a400
 r4:8387a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8387a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb76de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85372240
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8387a400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb5f3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8536738c r4:85367000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8536738c r4:84fa5f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8387a400 r8:84fa5fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fa5f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fa5f80 r8:80287e08 r7:eb761e60 r6:85363780 r5:8387a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb76dfb0 to 0xeb76dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85372180
INFO: task kworker/1:726:5194 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b3182000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:727:5195 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:727   state:D stack:0     pid:5195  tgid:5195  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb771d84 r8:00000002 r7:60000113 r6:eb771d8c r5:85503000
 r4:85503000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85503000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb771e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853725c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85503000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb611000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85367b8c r4:85367800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85367b8c r4:84dfcf00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85503000 r8:84dfcf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84dfcf00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84dfcf00 r8:80287e08 r7:eb76de60 r6:85363800 r5:85503000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb771fb0 to 0xeb771ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85372500
INFO: task kworker/1:727:5195 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b349c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:305:5197 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:305   state:D stack:0     pid:5197  tgid:5197  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb779d84 r8:00000002 r7:60000113 r6:eb779d8c r5:8387ec00
 r4:8387ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8387ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb779e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8530a440
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8387ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84669b8c r4:84669800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84669b8c r4:85363880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8387ec00 r8:853638ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85363880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85363880 r8:80287e08 r7:eb6c9e60 r6:85363900 r5:8387ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb779fb0 to 0xeb779ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8505fcc0
INFO: task kworker/0:305:5197 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b3948000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:728:5198 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:728   state:D stack:0     pid:5198  tgid:5198  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb77dd84 r8:00000002 r7:60000113 r6:eb77dd8c r5:8545ec00
 r4:8545ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8545ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb77de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85372400
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8545ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb605000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8536778c r4:85367400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8536778c r4:852fff80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8545ec00 r8:852fffac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852fff80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852fff80 r8:80287e08 r7:eb771e60 r6:85363980 r5:8545ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb77dfb0 to 0xeb77dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85372500
INFO: task kworker/1:728:5198 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b40a4000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:729:5200 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:729   state:D stack:0     pid:5200  tgid:5200  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb785d84 r8:00000002 r7:60000013 r6:eb785d8c r5:85560c00
 r4:85560c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85560c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb785e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85372680
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85560c00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb62d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85367f8c r4:85367c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85367f8c r4:85483080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85560c00 r8:854830ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85483080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85483080 r8:80287e08 r7:eb771e60 r6:85363a00 r5:85560c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb785fb0 to 0xeb785ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85372780
INFO: task kworker/1:729:5200 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b47d3000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:730:5202 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:730   state:D stack:0     pid:5202  tgid:5202  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb74dd84 r8:00000002 r7:60000113 r6:eb74dd8c r5:85508000
 r4:85508000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85508000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb74de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853727c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85508000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb639000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8552838c r4:85528000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8552838c r4:85483180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85508000 r8:854831ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85483180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85483180 r8:80287e08 r7:eb785e60 r6:85483200 r5:85508000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb74dfb0 to 0xeb74dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853726c0
INFO: task kworker/1:730:5202 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b4b49000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:731:5204 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:731   state:D stack:0     pid:5204  tgid:5204  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb731d84 r8:00000002 r7:60000013 r6:eb731d8c r5:85509800
 r4:85509800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85509800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb731e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853729c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85509800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb64b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8552878c r4:85528400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8552878c r4:85483000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85509800 r8:8548302c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85483000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85483000 r8:80287e08 r7:eb74de60 r6:85483100 r5:85509800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb731fb0 to 0xeb731ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853726c0
INFO: task kworker/1:731:5204 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b4ee9000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:732:5206 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:732   state:D stack:0     pid:5206  tgid:5206  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb78dd84 r8:00000002 r7:60000113 r6:eb78dd8c r5:8550a400
 r4:8550a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8550a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb78de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85372b40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8550a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb657000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85528b8c r4:85528800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85528b8c r4:85483280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8550a400 r8:854832ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85483280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85483280 r8:80287e08 r7:eb731e60 r6:85483400 r5:8550a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb78dfb0 to 0xeb78dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85372980
INFO: task kworker/1:732:5206 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b4f9f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:733:5208 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:733   state:D stack:0     pid:5208  tgid:5208  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb791d84 r8:00000002 r7:60000013 r6:eb791d8c r5:8550b000
 r4:8550b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8550b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb791e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85372e00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8550b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb79d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8552938c r4:85529000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8552938c r4:85483300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8550b000 r8:8548332c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85483300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85483300 r8:80287e08 r7:eb78de60 r6:85483500 r5:8550b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb791fb0 to 0xeb791ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85372b00
INFO: task kworker/1:733:5208 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b5626000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:734:5210 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:734   state:D stack:0     pid:5210  tgid:5210  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb795d84 r8:00000002 r7:60000013 r6:eb795d8c r5:8550bc00
 r4:8550bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8550bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb795e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85372c80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8550bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb797000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85528f8c r4:85528c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85528f8c r4:85483380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8550bc00 r8:854833ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85483380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85483380 r8:80287e08 r7:eb791e60 r6:85483480 r5:8550bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb795fb0 to 0xeb795ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85372bc0
INFO: task kworker/1:734:5210 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b5abe000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:735:5212 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:735   state:D stack:0     pid:5212  tgid:5212  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb7a1d84 r8:00000002 r7:60000113 r6:eb7a1d8c r5:8550c800
 r4:8550c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8550c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505fd80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8550c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb7ab000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8552978c r4:85529400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8552978c r4:85483600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8550c800 r8:8548362c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85483600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85483600 r8:80287e08 r7:eb791e60 r6:85483680 r5:8550c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7a1fb0 to 0xeb7a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85372dc0
INFO: task kworker/1:735:5212 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b5d59000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:736:5215 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:736   state:D stack:0     pid:5215  tgid:5215  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb7c5d84 r8:00000002 r7:60000013 r6:eb7c5d8c r5:85560000
 r4:85560000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85560000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534d040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85560000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb7b1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85529b8c r4:85529800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85529b8c r4:85483700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85560000 r8:8548372c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85483700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85483700 r8:80287e08 r7:eb7a1e60 r6:85363a80 r5:85560000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7c5fb0 to 0xeb7c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8534d080
INFO: task kworker/1:736:5215 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b62ef000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:737:5216 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:737   state:D stack:0     pid:5216  tgid:5216  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb7cdd84 r8:00000002 r7:60000013 r6:eb7cdd8c r5:85561800
 r4:85561800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85561800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7cde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534d4c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85561800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb7db000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8552a78c r4:8552a400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8552a78c r4:85483800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85561800 r8:8548382c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85483800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85483800 r8:80287e08 r7:eb7c5e60 r6:85363b00 r5:85561800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7cdfb0 to 0xeb7cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8534d2c0
INFO: task kworker/1:737:5216 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b64e9000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:738:5217 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:738   state:D stack:0     pid:5217  tgid:5217  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb7a9d84 r8:00000002 r7:60000013 r6:eb7a9d8c r5:8550d400
 r4:8550d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8550d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534d1c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8550d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb7bf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85529f8c r4:85529c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85529f8c r4:85483880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8550d400 r8:854838ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85483880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85483880 r8:80287e08 r7:eb7cde60 r6:85483580 r5:8550d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7a9fb0 to 0xeb7a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8534d2c0
INFO: task kworker/1:738:5217 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b6631000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:739:5220 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:739   state:D stack:0     pid:5220  tgid:5220  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb7bdd84 r8:00000002 r7:60000113 r6:eb7bdd8c r5:8550e000
 r4:8550e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8550e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7bde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534d380
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8550e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb7c9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8552a38c r4:8552a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8552a38c r4:85483900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8550e000 r8:8548392c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85483900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85483900 r8:80287e08 r7:eb7cde60 r6:85483980 r5:8550e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7bdfb0 to 0xeb7bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8534d340
INFO: task kworker/1:739:5220 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b67db000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:740:5221 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:740   state:D stack:0     pid:5221  tgid:5221  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb789d84 r8:00000002 r7:60000013 r6:eb789d8c r5:8550ec00
 r4:8550ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8550ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb789e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534d640
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8550ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb7e1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8552ab8c r4:8552a800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8552ab8c r4:85483780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8550ec00 r8:854837ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85483780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85483780 r8:80287e08 r7:eb7cde60 r6:85483b00 r5:8550ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb789fb0 to 0xeb789ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8534d340
INFO: task kworker/1:740:5221 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b69fe000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:741:5223 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:741   state:D stack:0     pid:5223  tgid:5223  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb7d9d84 r8:00000002 r7:60000113 r6:eb7d9d8c r5:85508c00
 r4:85508c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85508c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534d7c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85508c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb7ef000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8552af8c r4:8552ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8552af8c r4:85483a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85508c00 r8:85483a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85483a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85483a00 r8:80287e08 r7:eb789e60 r6:85483c00 r5:85508c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7d9fb0 to 0xeb7d9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8534d600
INFO: task kworker/1:741:5223 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b6b44000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:742:5226 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:742   state:D stack:0     pid:5226  tgid:5226  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb7edd84 r8:00000002 r7:60000113 r6:eb7edd8c r5:854fbc00
 r4:854fbc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:854fbc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ede08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534d900
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:854fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb7f5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8552b38c r4:8552b000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8552b38c r4:85483a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:854fbc00 r8:85483aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85483a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85483a80 r8:80287e08 r7:eb7d9e60 r6:85483e00 r5:854fbc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7edfb0 to 0xeb7edff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8534d780
INFO: task kworker/1:742:5226 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b6c29000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:743:5227 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:743   state:D stack:0     pid:5227  tgid:5227  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb7f9d84 r8:00000002 r7:60000013 r6:eb7f9d8c r5:85510000
 r4:85510000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85510000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534dd80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85510000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb817000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8552bf8c r4:8552bc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8552bf8c r4:85483d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85510000 r8:85483d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85483d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85483d00 r8:80287e08 r7:eb7ede60 r6:85483d80 r5:85510000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7f9fb0 to 0xeb7f9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8534da40
INFO: task kworker/1:743:5227 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b7021000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:744:5230 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:744   state:D stack:0     pid:5230  tgid:5230  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb801d84 r8:00000002 r7:60000013 r6:eb801d8c r5:85510c00
 r4:85510c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85510c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb801e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534dac0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85510c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb803000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8552b78c r4:8552b400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8552b78c r4:85483b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85510c00 r8:85483bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85483b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85483b80 r8:80287e08 r7:eb7f9e60 r6:85483e80 r5:85510c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb801fb0 to 0xeb801ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8534da80
INFO: task kworker/1:744:5230 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b7162000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:745:5232 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:745   state:D stack:0     pid:5232  tgid:5232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb80dd84 r8:00000002 r7:60000013 r6:eb80dd8c r5:85511800
 r4:85511800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85511800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb80de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534dc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85511800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb809000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8552bb8c r4:8552b800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8552bb8c r4:852ffe80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85511800 r8:852ffeac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:852ffe80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852ffe80 r8:80287e08 r7:eb7f9e60 r6:852fff00 r5:85511800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb80dfb0 to 0xeb80dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8534db40
INFO: task kworker/1:745:5232 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b72c2000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:746:5235 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:746   state:D stack:0     pid:5235  tgid:5235  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb821d84 r8:00000002 r7:60000013 r6:eb821d8c r5:85512400
 r4:85512400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85512400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb821e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534df00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85512400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb81d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8553038c r4:85530000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8553038c r4:855a7000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85512400 r8:855a702c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855a7000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855a7000 r8:80287e08 r7:eb7f9e60 r6:855a7080 r5:85512400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb821fb0 to 0xeb821ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8534dd40
INFO: task kworker/1:746:5235 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b74ba000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:747:5236 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:747   state:D stack:0     pid:5236  tgid:5236  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb7e5d84 r8:00000002 r7:60000013 r6:eb7e5d8c r5:85513000
 r4:85513000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85513000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a4000
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85513000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb82b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8553078c r4:85530400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8553078c r4:855a7100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85513000 r8:855a712c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855a7100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855a7100 r8:80287e08 r7:eb821e60 r6:855a7180 r5:85513000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7e5fb0 to 0xeb7e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8534dec0
INFO: task kworker/1:747:5236 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b7760000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:748:5239 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:748   state:D stack:0     pid:5239  tgid:5239  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb829d84 r8:00000002 r7:60000013 r6:eb829d8c r5:85513c00
 r4:85513c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85513c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb829e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a4140
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85513c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb831000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85530b8c r4:85530800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85530b8c r4:855a7200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85513c00 r8:855a722c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855a7200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855a7200 r8:80287e08 r7:eb7e5e60 r6:855a7300 r5:85513c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb829fb0 to 0xeb829ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855a4240
INFO: task kworker/1:748:5239 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b79e3000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:749:5240 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:749   state:D stack:0     pid:5240  tgid:5240  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb835d84 r8:00000002 r7:60000113 r6:eb835d8c r5:85514800
 r4:85514800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85514800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb835e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a4480
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85514800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb845000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8553138c r4:85531000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8553138c r4:855a7380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85514800 r8:855a73ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855a7380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855a7380 r8:80287e08 r7:eb829e60 r6:855a7480 r5:85514800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb835fb0 to 0xeb835ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855a43c0
INFO: task kworker/1:749:5240 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b7c8f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:750:5242 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:750   state:D stack:0     pid:5242  tgid:5242  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb83dd84 r8:00000002 r7:60000013 r6:eb83dd8c r5:85515400
 r4:85515400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85515400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb83de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a42c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85515400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb83f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85530f8c r4:85530c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85530f8c r4:855a7280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85515400 r8:855a72ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855a7280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855a7280 r8:80287e08 r7:eb835e60 r6:855a7580 r5:85515400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb83dfb0 to 0xeb83dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855a4280
INFO: task kworker/1:750:5242 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b7da3000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:751:5244 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:751   state:D stack:0     pid:5244  tgid:5244  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb849d84 r8:00000002 r7:60000113 r6:eb849d8c r5:85516000
 r4:85516000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85516000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb849e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a4780
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85516000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb859000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85531b8c r4:85531800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85531b8c r4:855a7400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85516000 r8:855a742c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855a7400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855a7400 r8:80287e08 r7:eb835e60 r6:855a7680 r5:85516000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb849fb0 to 0xeb849ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855a46c0
INFO: task kworker/1:751:5244 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b7da3000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
INFO: task kworker/1:752:5246 blocked for more than 473 seconds.
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb851d84 r8:00000002 r7:60000013 r6:eb851d8c r5:85516c00
 r4:85516c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85516c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb851e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a45c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85516c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb853000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8553178c r4:85531400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8553178c r4:855a7500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85516c00 r8:855a752c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855a7500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855a7500 r8:80287e08 r7:eb849e60 r6:855a7780 r5:85516c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb851fb0 to 0xeb851ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855a4500
INFO: task kworker/1:752:5246 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b8385000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r5:85518000 r4:8291a680
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:85531f8c r4:85531c00
 r7:ddde2d80 r6:83018200 r5:85531f8c r4:855a7600
 r10:00000000 r9:855a7600 r8:80287e08 r7:eb849e60 r6:855a7700 r5:85518000
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855a4740
INFO: task kworker/1:753:5248 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b8385000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
 r4:85518c00
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb865e08
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8553278c r4:85532400
 r7:ddde2d80 r6:83018200 r5:8553278c r4:855a7800
 r10:00000000 r9:855a7800 r8:80287e08 r7:eb85de60 r6:855a7900 r5:85518c00
 r4:855a4940
Workqueue: events bpf_prog_free_deferred
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b874f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:755:5252 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:755   state:D stack:0     pid:5252  tgid:5252  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb871d84 r8:00000002 r7:60000013 r6:eb871d8c r5:85519800
 r4:85519800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85519800 r4:8291a680
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r5:8553238c r4:85532000
 r10:61c88647 r9:85519800 r8:855a79ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb871fb0 to 0xeb871ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855a4a40
INFO: task kworker/1:755:5252 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:00000000
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8551a400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0683000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84669f8c r4:84669c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84669f8c r4:855a7b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8551a400 r8:855a7bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855a7b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855a7b80 r8:80287e08 r7:eb865e60 r6:855a7a00 r5:8551a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb879fb0 to 0xeb879ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855a4a40
INFO: task kworker/1:756:5257 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r5:80070013 r4:80239bb0
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r5:85ef9f8c r4:85ef9c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r5:8551b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c2e00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8551b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb153000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854ce78c r4:854ce400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854ce78c r4:855a7a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8551b000 r8:855a7aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855a7a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855a7a80 r8:80287e08 r7:eb879e60 r6:855a7b00 r5:8551b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6d5fb0 to 0xeb6d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855a4a40
INFO: task kworker/1:757:5258 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b8ebd000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb885d84 r8:00000002 r7:60000113 r6:eb885d8c r5:8551bc00
 r4:8551bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8551bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb885e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bc7c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8551bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb117000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85532b8c r4:85532800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85532b8c r4:855a7c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8551bc00 r8:855a7c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855a7c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855a7c00 r8:80287e08 r7:eb6d5e60 r6:855a7c80 r5:8551bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb885fb0 to 0xeb885ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855a4a40
INFO: task kworker/1:758:5259 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b8ebd000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb889e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854ccb8c r4:854cc800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:854ccb8c r4:85363c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8551c800 r8:85363c2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85363c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85363c00 r8:80287e08 r7:eb6c9e60 r6:855a7d00 r5:8551c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb889fb0 to 0xeb889ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855c2100
INFO: task kworker/0:306:5261 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b90da000 dfeb5000 00000001 80239b98 7f081000 00000001
 r5:00001000 r4:dfa13000
 r4:00000001
INFO: task kworker/0:307:5262 blocked for more than 473 seconds.
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r10:61c88647 r9:8551d400 r8:85363dac r7:82804d40 r6:dddced80 r5:dddceda0
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:308:5265 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:308   state:D stack:0     pid:5265  tgid:5265  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:84ee0000 r4:8291a680
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb899e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c2480
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854ccf8c r4:854ccc00
 r7:dddced80 r6:83018000 r5:854ccf8c r4:85363e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:00000000
 r5:00001000 r4:dfa13000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:84e0be80
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fa0:                                     00000000 00000000 00000000 00000000
 r4:84d87ac0
      Not tainted 6.15.0-rc6-syzkaller #0
Workqueue: events bpf_prog_free_deferred
 r4:84ee1800
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854cd78c r4:854cd400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:85363e80 r8:80287e08 r7:eb899e60 r6:855a7e80 r5:84ee1800
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:855c2440
Workqueue: events bpf_prog_free_deferred
 r4:00000000
1d20:                   b972e000 dfeb5000 00000001 80239b98 7f081000 00000001
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r5:00001000 r4:dfa13000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:310:5268 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:310   state:D stack:0     pid:5268  tgid:5268  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb8a5d84 r8:00000002 r7:60000113 r6:eb8a5d8c r5:84ee2400
 r4:84ee2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ee2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c2640
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ee2400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb015000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854cd38c r4:854cd000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:854cd38c r4:85363c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ee2400 r8:85363cac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85363c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85363c80 r8:80287e08 r7:eb8a1e60 r6:855a7f00 r5:84ee2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8a5fb0 to 0xeb8a5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855c2440
INFO: task kworker/0:310:5268 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b9870000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:311:5270 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:311   state:D stack:0     pid:5270  tgid:5270  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb8add84 r8:00000002 r7:60000113 r6:eb8add8c r5:84ee3c00
 r4:84ee3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ee3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ade08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c2980
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ee3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0c1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854cdf8c r4:854cdc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:854cdf8c r4:85363f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ee3c00 r8:85363fac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85363f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85363f80 r8:80287e08 r7:eb8a1e60 r6:855a7f80 r5:84ee3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8adfb0 to 0xeb8adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855c2540
INFO: task kworker/0:311:5270 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b9a57000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:312:5272 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:312   state:D stack:0     pid:5272  tgid:5272  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb881d84 r8:00000002 r7:60000113 r6:eb881d8c r5:85562400
 r4:85562400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85562400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb881e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c2840
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85562400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb087000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854cdb8c r4:854cd800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:854cdb8c r4:855b7000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85562400 r8:855b702c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:855b7000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b7000 r8:80287e08 r7:eb8ade60 r6:855b7080 r5:85562400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb881fb0 to 0xeb881ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855c26c0
INFO: task kworker/0:312:5272 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   b9dc1000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:313:5275 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:313   state:D stack:0     pid:5275  tgid:5275  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb8b5d84 r8:00000002 r7:60000113 r6:eb8b5d8c r5:85564800
 r4:85564800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85564800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c2b80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85564800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0f3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854ce38c r4:854ce000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:854ce38c r4:855b7100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85564800 r8:855b712c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:855b7100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b7100 r8:80287e08 r7:eb8ade60 r6:855b7280 r5:85564800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8b5fb0 to 0xeb8b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855c28c0
INFO: task kworker/0:313:5275 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ba3fb000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:314:5277 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:314   state:D stack:0     pid:5277  tgid:5277  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb8b9d84 r8:00000002 r7:60000013 r6:eb8b9d8c r5:85563000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:85563000 r8:855b71ac r7:82804d40 r6:dddced80 r5:dddceda0
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r5:00001000 r4:dfa13000
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r5:854cf78c r4:854cf400
 r10:61c88647 r9:85565400 r8:855b722c r7:82804d40 r6:dddced80 r5:dddceda0
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace: 
1d20:                   ba849000 dfeb5000 00000001 80239b98 7f081000 00000001
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:759:5280 blocked for more than 474 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:759   state:D stack:0     pid:5280  tgid:5280  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb8c5d84 r8:00000002 r7:60000113 r6:eb8c5d8c r5:85563c00
 r4:85563c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85563c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534fc80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85563c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaff5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85533b8c r4:85533800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85533b8c r4:855b1000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85563c00 r8:855b102c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855b1000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b1000 r8:80287e08 r7:eb6d5e60 r6:855b7300 r5:85563c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8c5fb0 to 0xeb8c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855bc780
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:82ac21e4
 r4:00000000
 r5:85ef9f8c r4:85ef9c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
 r4:85566c00
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c9e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced80 r6:83018000 r5:854cef8c r4:855b7400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   bb054000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:317:5286 blocked for more than 474 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:317   state:D stack:0     pid:5286  tgid:5286  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb8c1d84 r8:00000002 r7:60000013 r6:eb8c1d8c r5:8544e000
 r4:8544e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8544e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bb440
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8544e000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2f7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854cf38c r4:854cf000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:854cf38c r4:855b7500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8544e000 r8:855b752c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:855b7500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b7500 r8:80287e08 r7:eb8bde60 r6:855b7580 r5:8544e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8c1fb0 to 0xeb8c1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855bb400
INFO: task kworker/0:317:5286 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   bb2f0000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:318:5289 blocked for more than 474 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:318   state:D stack:0     pid:5289  tgid:5289  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb891d84 r8:00000002 r7:60000113 r6:eb891d8c r5:85566000
 r4:85566000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85566000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb891e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bb6c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85566000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb3bf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854cfb8c r4:854cf800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:854cfb8c r4:855b7680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85566000 r8:855b76ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:855b7680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b7680 r8:80287e08 r7:eb8bde60 r6:855b7800 r5:85566000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb891fb0 to 0xeb891ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855bb500
INFO: task kworker/0:318:5289 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   bb647000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:319:5290 blocked for more than 474 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:319   state:D stack:0     pid:5290  tgid:5290  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb8cdd84 r8:00000002 r7:60000013 r6:eb8cdd8c r5:8387bc00
 r4:8387bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8387bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8cde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bb680
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8387bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb4a5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854cff8c r4:854cfc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:854cff8c r4:855b7700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8387bc00 r8:855b772c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:855b7700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b7700 r8:80287e08 r7:eb891e60 r6:855b7780 r5:8387bc00
 r4:00000001
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:855bb500
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:320:5293 blocked for more than 474 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:320   state:D stack:0     pid:5293  tgid:5293  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb8ddd84 r8:00000002 r7:60000113 r6:eb8ddd8c r5:84ee6000
 r4:84ee6000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ee6000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8dde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bb940
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ee6000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb4c1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854d438c r4:854d4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:854d438c r4:855b7880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ee6000 r8:855b78ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:855b7880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b7880 r8:80287e08 r7:eb8cde60 r6:855b1080 r5:84ee6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8ddfb0 to 0xeb8ddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855bb8c0
INFO: task kworker/0:320:5293 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   bb647000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:321:5294 blocked for more than 474 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:321   state:D stack:0     pid:5294  tgid:5294  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb8e1d84 r8:00000002 r7:60000113 r6:eb8e1d8c r5:84ee5400
 r4:84ee5400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ee5400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bbb40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ee5400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb4dd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854d478c r4:854d4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:854d478c r4:855b7980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ee5400 r8:855b79ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:855b7980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b7980 r8:80287e08 r7:eb8dde60 r6:855b1100 r5:84ee5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8e1fb0 to 0xeb8e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855bb980
INFO: task kworker/0:321:5294 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   bba7c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:854d4f8c r4:854d4c00
 r4:855b7900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b7900 r8:80287e08 r7:eb8e1e60 r6:855b1180 r5:84ee0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8e9fb0 to 0xeb8e9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855bbb00
INFO: task kworker/0:322:5296 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   bbc9b000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:323:5297 blocked for more than 474 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:323   state:D stack:0     pid:5297  tgid:5297  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb8edd84 r8:00000002 r7:60000113 r6:eb8edd8c r5:84ee6c00
 r4:84ee6c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ee6c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ede08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bbbc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ee6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854d4b8c r4:854d4800
 r10:61c88647 r9:84ee6c00 r8:855b7aac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:760:5299 blocked for more than 474 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:760   state:D stack:0     pid:5299  tgid:5299  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb8f1d84 r8:00000002 r7:60000113 r6:eb8f1d8c r5:84ee4800
 r4:84ee4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ee4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534fa00
 r4:00000000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:855b1280
Exception stack(0xeb8f1fb0 to 0xeb8f1ff8)
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
 r10:8291a684 r9:eb8f5d84 r8:00000002 r7:60000013 r6:eb8f5d8c r5:84ee3000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854d6b8c r4:854d6800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:854d6b8c r4:855b7a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ee3000 r8:855b7a2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:855b7a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b7a00 r8:80287e08 r7:eb8e9e60 r6:855b1380 r5:84ee3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8f5fb0 to 0xeb8f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855bbf00
INFO: task kworker/0:324:5300 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   bc271000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r4:00000000
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854d538c r4:854d5000
 r10:61c88647 r9:8551e000 r8:855b7bac r7:82804d40 r6:dddced80 r5:dddceda0
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:85520c00 r8:855b7c2c r7:82804d40 r6:dddced80 r5:dddceda0
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:327:5306 blocked for more than 474 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:327   state:D stack:0     pid:5306  tgid:5306  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb911d84 r8:00000002 r7:60000013 r6:eb911d8c r5:85522400
 r4:85522400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85522400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb911e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa1c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85522400 r7:00000000 r6:83018000 r5:00001000 r4:7f099000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb913000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854d5b8c r4:854d5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:854d5b8c r4:855b7c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85522400 r8:855b7cac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:855b7c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b7c80 r8:80287e08 r7:eb8f5e60 r6:855b1500 r5:85522400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb911fb0 to 0xeb911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855aa000
INFO: task kworker/0:327:5306 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   bcb4e000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:328:5308 blocked for more than 474 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:328   state:D stack:0     pid:5308  tgid:5308  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb925d84 r8:00000002 r7:60000113 r6:eb925d8c r5:85521800
 r4:85521800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85521800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb925e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa340
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85521800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb919000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854d5f8c r4:854d5c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:854d5f8c r4:855b7d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/0:329:5310 blocked for more than 474 seconds.
 r5:85520000 r4:8291a680
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa3c0
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:80070013 r4:80239bb0
 r4:dffe1dc0
 r5:00001000 r4:dfa13000
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
1fa0:                                     00000000 00000000 00000000 00000000
task:kworker/0:330   state:D stack:0     pid:5312  tgid:5312  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa580
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85523000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb935000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854d678c r4:854d6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:854d678c r4:855b7e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85523000 r8:855b7eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:855b7e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b7e80 r8:80287e08 r7:eb8f5e60 r6:855b1680 r5:85523000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb93dfb0 to 0xeb93dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855aa400
INFO: task kworker/0:330:5312 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   bdc57000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:331:5314 blocked for more than 474 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:331   state:D stack:0     pid:5314  tgid:5314  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r10:8291a684 r9:eb951d84 r8:00000002 r7:60000113 r6:eb951d8c r5:85523c00
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:85523c00 r8:855b7f2c r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:332:5316 blocked for more than 474 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:332   state:D stack:0     pid:5316  tgid:5316  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb95dd84 r8:00000002 r7:60000013 r6:eb95dd8c r5:85524800
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854d6f8c r4:854d6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:854d6f8c r4:855b7f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85524800 r8:855b7fac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:855b7f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b7f80 r8:80287e08 r7:eb951e60 r6:855b1780 r5:85524800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb95dfb0 to 0xeb95dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855aa6c0
INFO: task kworker/0:332:5316 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   bef99000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/0:333:5318 blocked for more than 474 seconds.
 r4:85525400
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa980
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:85525400 r8:855b7b2c r7:82804d40 r6:dddced80 r5:dddceda0
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:855aa8c0
INFO: task kworker/0:333:5318 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   bf3d6000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r5:00001000 r4:dfa7d000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85370540
 r5:00001000 r4:eb8a9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8564438c r4:85644000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8564438c r4:85363d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85579800 r8:85363d2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85363d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85363d00 r8:80287e08 r7:eb951e60 r6:85363f00 r5:85579800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8d5fb0 to 0xeb8d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855aaa40
INFO: task kworker/0:335:5324 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c007e000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:336:5325 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:336   state:D stack:0     pid:5325  tgid:5325  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb811d84 r8:00000002 r7:60000113 r6:eb811d8c r5:8557a400
 r4:8557a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb811e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:852f7000
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
1d20:                   c0392000 dfeb5000 00000001 80239b98 7f081000 00000001
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:00000001
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:761:5328 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:761   state:D stack:0     pid:5328  tgid:5328  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb975d84 r8:00000002 r7:60000013 r6:eb975d8c r5:8557bc00
 r4:8557bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8557bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb975e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534fac0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8557bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadeb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8553378c r4:85533400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8553378c r4:855b1980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8557bc00 r8:855b19ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855b1980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b1980 r8:80287e08 r7:eb8c5e60 r6:852f7100 r5:8557bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb975fb0 to 0xeb975ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8534fb00
INFO: task kworker/1:761:5328 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c0392000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:762:5330 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:762   state:D stack:0     pid:5330  tgid:5330  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb979d84 r8:00000002 r7:60000013 r6:eb979d8c r5:8557c800
 r4:8557c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8557c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb979e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534f340
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8557c800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb269000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85548b8c r4:85548800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85548b8c r4:855b1b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8557c800 r8:855b1b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855b1b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b1b00 r8:80287e08 r7:eb8c5e60 r6:852f7180 r5:8557c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb979fb0 to 0xeb979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8534fbc0
INFO: task kworker/1:762:5330 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c087f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:763:5331 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:763   state:D stack:0     pid:5331  tgid:5331  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb97dd84 r8:00000002 r7:60000113 r6:eb97dd8c r5:8557d400
 r4:8557d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8557d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb97de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534fe00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8557d400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb1d1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85533f8c r4:85533c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85533f8c r4:855b1c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8557d400 r8:855b1c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855b1c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b1c00 r8:80287e08 r7:eb979e60 r6:852f7200 r5:8557d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb97dfb0 to 0xeb97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8534fbc0
INFO: task kworker/1:763:5331 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c0d5c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:764:5334 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:764   state:D stack:0     pid:5334  tgid:5334  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb981d84 r8:00000002 r7:60000113 r6:eb981d8c r5:8557e000
 r4:8557e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8557e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb981e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534fe80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8557e000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb1f5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8554838c r4:85548000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8554838c r4:855b1b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8557e000 r8:855b1bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855b1b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b1b80 r8:80287e08 r7:eb979e60 r6:852f7280 r5:8557e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb981fb0 to 0xeb981ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8534fd80
INFO: task kworker/1:764:5334 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c0fc8000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:765:5336 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:765   state:D stack:0     pid:5336  tgid:5336  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb989d84 r8:00000002 r7:60000113 r6:eb989d8c r5:8557b000
 r4:8557b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8557b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb989e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534f800
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8557b000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb22f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8554878c r4:85548400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8554878c r4:855b1c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8557b000 r8:855b1cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855b1c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b1c80 r8:80287e08 r7:eb979e60 r6:852f7300 r5:8557b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb989fb0 to 0xeb989ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8534ff80
INFO: task kworker/1:765:5336 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c1085000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:766:5338 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:766   state:D stack:0     pid:5338  tgid:5338  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb991d84 r8:00000002 r7:60000113 r6:eb991d8c r5:84248000
 r4:84248000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84248000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb991e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534f780
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84248000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2a7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85548f8c r4:85548c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85548f8c r4:855b1d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84248000 r8:855b1dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855b1d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b1d80 r8:80287e08 r7:eb979e60 r6:852f7380 r5:84248000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb991fb0 to 0xeb991ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8534f480
INFO: task kworker/1:766:5338 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c1be2000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:767:5339 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:767   state:D stack:0     pid:5339  tgid:5339  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb995d84 r8:00000002 r7:60000113 r6:eb995d8c r5:84248c00
 r4:84248c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84248c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb995e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bbf40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84248c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb3d3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8554938c r4:85549000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8554938c r4:855b1e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84248c00 r8:855b1e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855b1e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b1e00 r8:80287e08 r7:eb991e60 r6:852f7400 r5:84248c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb995fb0 to 0xeb995ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8534f480
INFO: task kworker/1:767:5339 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c1be2000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:768:5341 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:768   state:D stack:0     pid:5341  tgid:5341  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb99dd84 r8:00000002 r7:60000113 r6:eb99dd8c r5:8424a400
 r4:8424a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8424a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb99de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855983c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8424a400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb5bb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8554a78c r4:8554a400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8554a78c r4:855b1d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8424a400 r8:855b1d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855b1d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b1d00 r8:80287e08 r7:eb995e60 r6:852f7480 r5:8424a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb99dfb0 to 0xeb99dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8534f7c0
INFO: task kworker/1:768:5341 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c1e90000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:769:5344 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:769   state:D stack:0     pid:5344  tgid:5344  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb9a9d84 r8:00000002 r7:60000013 r6:eb9a9d8c r5:84249800
 r4:84249800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84249800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bc880
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84249800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb425000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8554978c r4:85549400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8554978c r4:855b1f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84249800 r8:855b1f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855b1f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b1f00 r8:80287e08 r7:eb99de60 r6:852f7500 r5:84249800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9a9fb0 to 0xeb9a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855bcf00
INFO: task kworker/1:769:5344 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c28e9000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:770:5345 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:770   state:D stack:0     pid:5345  tgid:5345  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb7d1d84 r8:00000002 r7:60000113 r6:eb7d1d8c r5:85526c00
 r4:85526c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85526c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a4a80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85526c00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb441000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85549b8c r4:85549800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85549b8c r4:855b1e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85526c00 r8:855b1eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855b1e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b1e80 r8:80287e08 r7:eb99de60 r6:855b1880 r5:85526c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7d1fb0 to 0xeb7d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855a4a00
INFO: task kworker/1:770:5345 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c28e9000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:771:5348 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:771   state:D stack:0     pid:5348  tgid:5348  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb9add84 r8:00000002 r7:60000113 r6:eb9add8c r5:85526000
 r4:85526000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85526000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9ade08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85598000
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85526000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb479000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85549f8c r4:85549c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85549f8c r4:855b1f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85526000 r8:855b1fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855b1f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b1f80 r8:80287e08 r7:eb99de60 r6:855b1900 r5:85526000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9adfb0 to 0xeb9adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85598100
INFO: task kworker/1:771:5348 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c2c51000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:772:5350 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:772   state:D stack:0     pid:5350  tgid:5350  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb971d84 r8:00000002 r7:60000113 r6:eb971d8c r5:855d0000
 r4:855d0000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855d0000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:8554a38c r4:8554a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:855d0000 r8:85483cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb971fb0 to 0xeb971ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85598180
INFO: task kworker/1:772:5350 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c35e2000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:773:5352 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:773   state:D stack:0     pid:5352  tgid:5352  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb9b1d84 r8:00000002 r7:60000013 r6:eb9b1d8c r5:855d1800
 r4:855d1800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855d1800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855987c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855d1800 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb619000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8554af8c r4:8554ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8554af8c r4:8559c000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855d1800 r8:8559c02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r10:00000000 r9:8559c000 r8:80287e08 r7:eb99de60 r6:8559c180 r5:855d1800
 r4:85598380
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018205 r8:855d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
 r5:8554ab8c r4:8554a800
 r10:61c88647 r9:855d0c00 r8:8559c0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:85598280
INFO: task kworker/1:774:5354 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c35e2000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:775:5356 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:775   state:D stack:0     pid:5356  tgid:5356  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb9bdd84 r8:00000002 r7:60000013 r6:eb9bdd8c r5:8424b000
 r4:8424b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8424b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9bde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85598900
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8424b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb637000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8554b38c r4:8554b000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8554b38c r4:8559c300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8424b000 r8:8559c32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8559c300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8559c300 r8:80287e08 r7:eb9b1e60 r6:852f7580 r5:8424b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9bdfb0 to 0xeb9bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855989c0
INFO: task kworker/1:775:5356 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c3a6a000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/1:776:5358 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:776   state:D stack:0     pid:5358  tgid:5358  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb9c1d84 r8:00000002 r7:60000013 r6:eb9c1d8c r5:8424bc00
 r4:8424bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8424bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85598a80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8424bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb64d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8554b78c r4:8554b400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8554b78c r4:8559c200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8424bc00 r8:8559c22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8559c200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8559c200 r8:80287e08 r7:eb9bde60 r6:852f7600 r5:8424bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9c1fb0 to 0xeb9c1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:85598840
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/1:777:5360 blocked for more than 475 seconds.
 r10:8291a684 r9:eb9c9d84 r8:00000002 r7:60000113 r6:eb9c9d8c r5:8424e000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
 r5:00001000 r4:eb717000
 r5:8554bf8c r4:8554bc00
 r10:61c88647 r9:8424e000 r8:8559c42c r7:82804d40 r6:ddde2d80 r5:ddde2da0
Exception stack(0xeb9c9fb0 to 0xeb9c9ff8)
 r4:85598a40
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:778:5362 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:778   state:D stack:0     pid:5362  tgid:5362  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb9d1d84 r8:00000002 r7:60000113 r6:eb9d1d8c r5:8424c800
 r4:8424c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8424c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85598b00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8424c800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb661000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8554bb8c r4:8554b800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8554bb8c r4:8559c480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8424c800 r8:8559c4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8559c480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8559c480 r8:80287e08 r7:eb9c9e60 r6:852f7700 r5:8424c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9d1fb0 to 0xeb9d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85598c80
INFO: task kworker/1:778:5362 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c464c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
INFO: task kworker/1:779:5364 blocked for more than 475 seconds.
Call trace: 
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d9e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:85550f8c r4:85550c00
 r10:61c88647 r9:85578000 r8:8559c52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:780:5366 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:780   state:D stack:0     pid:5366  tgid:5366  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb9ddd84 r8:00000002 r7:60000013 r6:eb9ddd8c r5:8557ec00
 r4:8557ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8557ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9dde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85598e00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8557ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb725000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8555038c r4:85550000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8555038c r4:8559c280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8557ec00 r8:8559c2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8559c280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8559c280 r8:80287e08 r7:eb9d9e60 r6:852f7800 r5:8557ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c4ad6000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:781:5367 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:781   state:D stack:0     pid:5367  tgid:5367  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb9e1d84 r8:00000002 r7:60000013 r6:eb9e1d8c r5:8424d400
 r4:8424d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8424d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559a040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8424d400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8555078c r4:85550400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:8424d400 r8:8559c5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r4:dffe1dc0
 r4:00000000
 r5:85ef9f8c r4:85ef9c00
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
task:kworker/1:782   state:D stack:0     pid:5370  tgid:5370  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559a280
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8424ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb767000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85550b8c r4:85550800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85550b8c r4:8559c680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8424ec00 r8:8559c6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8559c680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8559c680 r8:80287e08 r7:eb9d9e60 r6:852f7900 r5:8424ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9b5fb0 to 0xeb9b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8559a240
INFO: task kworker/1:782:5370 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
      Not tainted 6.15.0-rc6-syzkaller #0
 r4:84e20c00
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018205 r8:84e20c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
 r5:8555138c r4:85551000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:8559c700
Exception stack(0xeb861fb0 to 0xeb861ff8)
 r4:8559a340
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/1:784:5375 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:784   state:D stack:0     pid:5375  tgid:5375  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb895d84 r8:00000002 r7:60000113 r6:eb895d8c r5:84e20000
 r4:84e20000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84e20000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb895e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559a5c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84e20000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e891f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8555178c r4:85551400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8555178c r4:8559c600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84e20000 r8:8559c62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8559c600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8559c600 r8:80287e08 r7:eb861e60 r6:852f7980 r5:84e20000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb895fb0 to 0xeb895ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8559a440
INFO: task kworker/1:784:5375 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r5:85ef9f8c r4:85ef9c00
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/1:785:5377 blocked for more than 475 seconds.
 r10:8291a684 r9:eb901d84 r8:00000002 r7:60000113 r6:eb901d8c r5:84e23000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r7:ddde2d80 r6:83018200 r5:85551b8c r4:8559c780
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:786:5379 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:786   state:D stack:0     pid:5379  tgid:5379  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb91dd84 r8:00000002 r7:60000013 r6:eb91dd8c r5:84e23c00
 r4:84e23c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84e23c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb91de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559ab00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84e23c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb031000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8555278c r4:85552400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8555278c r4:8559c880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84e23c00 r8:8559c8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8559c880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8559c880 r8:80287e08 r7:eb901e60 r6:852f7b00 r5:84e23c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb91dfb0 to 0xeb91dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8559a500
Workqueue: events bpf_prog_free_deferred
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85551f8c r4:85551c00
 r10:61c88647 r9:84e22400 r8:8559c92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d20:                   c5bcc000 dfeb5000 00000001 80239b98 7f081000 00000001
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r5:00001000 r4:dfa13000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:00000001
 r4:84d87ac0
      Not tainted 6.15.0-rc6-syzkaller #0
 r10:8291a684 r9:eb9c5d84 r8:00000002 r7:60000113 r6:eb9c5d8c r5:855d3000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8555238c r4:85552000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8555238c r4:8559c980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855d3000 r8:8559c9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8559c980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8559c980 r8:80287e08 r7:eb91de60 r6:8559ca00 r5:855d3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9c5fb0 to 0xeb9c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8559a800
INFO: task kworker/1:788:5382 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c5f26000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:789:5385 blocked for more than 476 seconds.
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559acc0
 r5:85552b8c r4:85552800
 r10:61c88647 r9:855d4800 r8:8559c3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
Exception stack(0xeb941fb0 to 0xeb941ff8)
 r4:8559ac00
Workqueue: events bpf_prog_free_deferred
1d20:                   c6340000 dfeb5000 00000001 80239b98 7f081000 00000001
 r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:790:5388 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:790   state:D stack:0     pid:5388  tgid:5388  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb945d84 r8:00000002 r7:60000013 r6:eb945d8c r5:855d5400
 r4:855d5400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855d5400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb945e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559ad40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0db000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85552f8c r4:85552c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85552f8c r4:8559c800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855d5400 r8:8559c82c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8559c800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8559c800 r8:80287e08 r7:eb941e60 r6:8559cb80 r5:855d5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb945fb0 to 0xeb945ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8559ac80
INFO: task kworker/1:790:5388 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c6da7000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:791:5389 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:791   state:D stack:0     pid:5389  tgid:5389  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb815d84 r8:00000002 r7:60000013 r6:eb815d8c r5:855d6000
 r4:855d6000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855d6000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:8555338c r4:85553000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8555338c r4:8559cc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855d6000 r8:8559cc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8559cc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8559cc00 r8:80287e08 r7:eb945e60 r6:8559ca80 r5:855d6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb815fb0 to 0xeb815ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8559ac80
INFO: task kworker/1:791:5389 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c6da7000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018205 r8:855d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
 r5:8555378c r4:85553400
 r10:61c88647 r9:855d3c00 r8:8559ccac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8559ad80
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r4:82ac21e4
 r4:00000000
 r5:00001000 r4:dfa13000
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:793:5392 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:793   state:D stack:0     pid:5392  tgid:5392  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb9e9d84 r8:00000002 r7:60000113 r6:eb9e9d8c r5:855d2400
 r4:855d2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855d2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bf040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb327000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85553f8c r4:85553c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85553f8c r4:8559ce00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855d2400 r8:8559ce2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8559ce00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8559ce00 r8:80287e08 r7:eb969e60 r6:8559cd00 r5:855d2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9e9fb0 to 0xeb9e9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8555e400
INFO: task kworker/1:793:5392 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c7203000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r5:855d8000 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:00001000 r4:eb2e5000
 r5:85553b8c r4:85553800
 r10:61c88647 r9:855d8000 r8:85483fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:795:5398 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:795   state:D stack:0     pid:5398  tgid:5398  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb9f9d84 r8:00000002 r7:60000113 r6:eb9f9d8c r5:84e26000
 r4:84e26000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84e26000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bf180
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84e26000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
 r5:00001000 r4:eb497000
 r5:8555438c r4:85554000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:8559cf80
9fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r4:dffe1dc0
 r4:00000000
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
 r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
 r5:00001000 r4:eb4bf000
 r5:8555478c r4:85554400
 r10:61c88647 r9:84e26c00 r8:855c802c r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c7cdc000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba05e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85555f8c r4:85555c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85555f8c r4:855c8080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84e21800 r8:855c80ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855c8080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855c8080 r8:80287e08 r7:eb9fde60 r6:852f7d00 r5:84e21800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba05fb0 to 0xeba05ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855bf2c0
INFO: task kworker/1:797:5401 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c7cdc000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018205 r8:8551ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
 r5:85554b8c r4:85554800
 r10:61c88647 r9:8551ec00 r8:855c812c r7:82804d40 r6:ddde2d80 r5:ddde2da0
Exception stack(0xeba09fb0 to 0xeba09ff8)
Workqueue: events bpf_prog_free_deferred
 r4:00000000
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r4:dffe1dc0
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/1:799:5404 blocked for more than 476 seconds.
 r4:855d8c00
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bf500
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb669000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85554f8c r4:85554c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85554f8c r4:855c8180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855d8c00 r8:855c81ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855c8180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855c8180 r8:80287e08 r7:eba05e60 r6:855c8280 r5:855d8c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9e5fb0 to 0xeb9e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855bf440
INFO: task kworker/1:799:5404 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c8891000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:800:5406 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r7:ddde2d80 r6:83018200 r5:8555538c r4:855c8300
 r4:855c8300
1fa0:                                     00000000 00000000 00000000 00000000
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r4:dffe1dc0
 r4:00000000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aef80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84dd0000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb7c7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8466af8c r4:8466ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8466af8c r4:852f7e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84dd0000 r8:852f7e2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:852f7e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852f7e00 r8:80287e08 r7:eb8d5e60 r6:852f7f80 r5:84dd0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9f1fb0 to 0xeb9f1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855aec40
INFO: task kworker/0:337:5409 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c8c11000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r5:84dd1800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba19e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bf980
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84dd1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8555578c r4:85555400
 r7:ddde2d80 r6:83018200 r5:8555578c r4:855c8200
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c8c11000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:84d87ac0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bfb00
 r9:83018205 r8:84dd2400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85555b8c r4:85555800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85555b8c r4:855c8500
 r10:61c88647 r9:84dd2400 r8:855c852c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855c8500
 r4:00000001
Exception stack(0xeba1dfb0 to 0xeba1dff8)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
1d20:                   c8daf000 dfeb5000 00000001 80239b98 7f081000 00000001
 r4:82ac21e4
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:00000000
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:803:5416 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:803   state:D stack:0     pid:5416  tgid:5416  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba25d84 r8:00000002 r7:60000113 r6:eba25d8c r5:84dd3c00
 r4:84dd3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84dd3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba25e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bfd80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84dd3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb7e9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8555638c r4:85556000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8555638c r4:855c8580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84dd3c00 r8:855c85ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855c8580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855c8580 r8:80287e08 r7:eba05e60 r6:85384000 r5:84dd3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba25fb0 to 0xeba25ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855bfb80
INFO: task kworker/1:803:5416 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c911b000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:804:5419 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:804   state:D stack:0     pid:5419  tgid:5419  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba31d84 r8:00000002 r7:60000013 r6:eba31d8c r5:84dd3000
 r4:84dd3000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84dd3000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba31e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bfe80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84dd3000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb7fb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8555678c r4:85556400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8555678c r4:855c8480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84dd3000 r8:855c84ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855c8480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855c8480 r8:80287e08 r7:eba25e60 r6:85384180 r5:84dd3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba31fb0 to 0xeba31ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855bfdc0
INFO: task kworker/1:804:5419 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c958f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:805:5420 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:805   state:D stack:0     pid:5420  tgid:5420  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba35d84 r8:00000002 r7:60000113 r6:eba35d8c r5:84dd4800
 r4:84dd4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84dd4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba35e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c5380
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84dd4800 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb82f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8555738c r4:85557000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8555738c r4:855c8680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84dd4800 r8:855c86ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855c8680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855c8680 r8:80287e08 r7:eba31e60 r6:85384080 r5:84dd4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba35fb0 to 0xeba35ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855bfec0
INFO: task kworker/1:805:5420 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c961c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
 r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
INFO: task kworker/0:338:5421 blocked for more than 476 seconds.
 r10:8291a684 r9:eba39d84 r8:00000002 r7:60000113 r6:eba39d8c r5:84dd6000
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:8564478c r4:85644400
 r10:61c88647 r9:84dd6000 r8:8538412c r7:82804d40 r6:dddced80 r5:dddceda0
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855ae440
INFO: task kworker/0:338:5421 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   c9819000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018205 r8:84dd6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
 r5:85556b8c r4:85556800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:00000001
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r4:00000001
 r4:84d87ac0
task:kworker/1:807   state:D stack:0     pid:5423  tgid:5423  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c5240
 r5:85556f8c r4:85556c00
 r7:ddde2d80 r6:83018200 r5:85556f8c r4:855c8780
 r4:00000001
 r4:855c50c0
Workqueue: events bpf_prog_free_deferred
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:808:5427 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:808   state:D stack:0     pid:5427  tgid:5427  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba45d84 r8:00000002 r7:60000013 r6:eba45d8c r5:84dd0c00
 r4:84dd0c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84dd0c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c5400
 r5:8555778c r4:85557400
 r7:ddde2d80 r6:83018200 r5:8555778c r4:855c8380
5fa0:                                     00000000 00000000 00000000 00000000
 r4:00000000
 r4:82ac21e4
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
task:kworker/1:809   state:D stack:0     pid:5430  tgid:5430  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c5500
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85588000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb84d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85557b8c r4:85557800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85557b8c r4:855c8800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85588000 r8:855c882c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855c8800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855c8800 r8:80287e08 r7:eba45e60 r6:85384400 r5:85588000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba51fb0 to 0xeba51ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855c5100
INFO: task kworker/1:809:5430 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ca212000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
      Not tainted 6.15.0-rc6-syzkaller #0
Call trace: 
 r5:855db000 r4:8291a680
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:855db000 r8:855c872c r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r5:85ef9f8c r4:85ef9c00
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
      Not tainted 6.15.0-rc6-syzkaller #0
 r10:8291a684 r9:eba4dd84 r8:00000002 r7:60000013 r6:eba4dd8c r5:855da400
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:8560838c r4:85608000
 r7:ddde2d80 r6:83018200 r5:8560838c r4:855c8900
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
1d20:                   ca668000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:812:5435 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:812   state:D stack:0     pid:5435  tgid:5435  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba55d84 r8:00000002 r7:60000013 r6:eba55d8c r5:855dc800
 r4:855dc800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855dc800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba55e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c5c40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb8f9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8560878c r4:85608400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8560878c r4:855c8880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855dc800 r8:855c88ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855c8880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855c8880 r8:80287e08 r7:eba4de60 r6:855c8a00 r5:855dc800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba55fb0 to 0xeba55ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855c5780
INFO: task kworker/1:812:5435 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
Exception stack(0xdffe1d28 to 0xdffe1d70)
 r4:82ac21e4
 r4:00000000
 r5:85ef9f8c r4:85ef9c00
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/0:339:5438 blocked for more than 476 seconds.
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:85384480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85384480 r8:80287e08 r7:eba39e60 r6:855c8b00 r5:855dec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba61fb0 to 0xeba61ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85370600
INFO: task kworker/0:339:5438 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ca92e000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:813:5440 blocked for more than 476 seconds.
 r10:8291a684 r9:eba5dd84 r8:00000002 r7:60000013 r6:eba5dd8c r5:855dd400
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:85608b8c r4:85608800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:855c8b80 r8:80287e08 r7:eba55e60 r6:855c8d00 r5:855dd400
 r4:855c5c00
Workqueue: events bpf_prog_free_deferred
1d20:                   cacff000 dfeb5000 00000001 80239b98 7f081000 00000001
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018205 r8:855de000 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
 r5:85608f8c r4:85608c00
 r4:855c8c00
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:82ac21e4
 r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:815:5444 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:815   state:D stack:0     pid:5444  tgid:5444  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba15d84 r8:00000002 r7:60000013 r6:eba15d8c r5:855dbc00
 r4:855dbc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855dbc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba15e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c59c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea981000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8560938c r4:85609000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8560938c r4:855c8c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855dbc00 r8:855c8cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855c8c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855c8c80 r8:80287e08 r7:eba59e60 r6:855c8e80 r5:855dbc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba15fb0 to 0xeba15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855c5ec0
INFO: task kworker/1:815:5444 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cb053000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018205 r8:855d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
 r5:8560978c r4:85609400
 r4:8559cf00
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r4:855bfec0
INFO: task kworker/1:816:5446 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cb053000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:8291a684 r9:eb9a1d84 r8:00000002 r7:60000013 r6:eb9a1d8c r5:855e0000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8560a38c r4:8560a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8560a38c r4:855c8d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855e0000 r8:855c8dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855c8d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855c8d80 r8:80287e08 r7:eb985e60 r6:855c8f80 r5:855e0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9a1fb0 to 0xeb9a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855bfec0
INFO: task kworker/1:817:5448 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cb464000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:818   state:D stack:0     pid:5450  tgid:5450  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r7:ddde2d80 r6:83018200 r5:85609b8c r4:84fab080
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cb464000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:819:5452 blocked for more than 476 seconds.
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85609f8c r4:85609c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85609f8c r4:84fab100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855e0c00 r8:84fab12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fab100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fab100 r8:80287e08 r7:eb9a1e60 r6:84fab280 r5:855e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba6dfb0 to 0xeba6dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f80240
INFO: task kworker/1:819:5452 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r4:00000000
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:820   state:D stack:0     pid:5454  tgid:5454  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:855e3000 r8:84fab1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/1:821:5457 blocked for more than 476 seconds.
 r10:8291a684 r9:eba71d84 r8:00000002 r7:60000113 r6:eba71d8c r5:855e3c00
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:8560b38c r4:8560b000
 r7:ddde2d80 r6:83018200 r5:8560b38c r4:84fab200
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Workqueue: events bpf_prog_free_deferred
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cb9dc000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:822:5458 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:822   state:D stack:0     pid:5458  tgid:5458  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba75d84 r8:00000002 r7:60000113 r6:eba75d8c r5:855e4800
 r4:855e4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855e4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba75e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f80840
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb3cd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8560ab8c r4:8560a800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8560ab8c r4:84fab480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855e4800 r8:84fab4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fab480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fab480 r8:80287e08 r7:eba71e60 r6:84fab300 r5:855e4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba75fb0 to 0xeba75ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f80780
INFO: task kworker/1:822:5458 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cbd86000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:823:5461 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:823   state:D stack:0     pid:5461  tgid:5461  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba79d84 r8:00000002 r7:60000113 r6:eba79d8c r5:855e5400
 r4:855e5400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855e5400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba79e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f80a00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb42f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8560af8c r4:8560ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8560af8c r4:84fab500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855e5400 r8:84fab52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fab500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fab500 r8:80287e08 r7:eba71e60 r6:84fab600 r5:855e5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba79fb0 to 0xeba79ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f809c0
INFO: task kworker/1:823:5461 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cc051000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:824:5462 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:824   state:D stack:0     pid:5462  tgid:5462  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba7dd84 r8:00000002 r7:60000113 r6:eba7dd8c r5:855e6000
 r4:855e6000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855e6000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba7de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f80d00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb521000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8560b78c r4:8560b400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8560b78c r4:84fab680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855e6000 r8:84fab6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fab680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fab680 r8:80287e08 r7:eba71e60 r6:84fab580 r5:855e6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba7dfb0 to 0xeba7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f80a80
INFO: task kworker/1:824:5462 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cc051000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:825:5464 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:825   state:D stack:0     pid:5464  tgid:5464  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba81d84 r8:00000002 r7:60000113 r6:eba81d8c r5:855e6c00
 r4:855e6c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855e6c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba81e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3d040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb61b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8560bf8c r4:8560bc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8560bf8c r4:84fab700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855e6c00 r8:84fab72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fab700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fab700 r8:80287e08 r7:eba7de60 r6:84fab880 r5:855e6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba81fb0 to 0xeba81ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f80cc0
INFO: task kworker/1:825:5464 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cc496000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:826:5467 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:826   state:D stack:0     pid:5467  tgid:5467  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba85d84 r8:00000002 r7:60000113 r6:eba85d8c r5:855e2400
 r4:855e2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855e2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba85e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3d140
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb643000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8561438c r4:85614000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8561438c r4:84fab780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855e2400 r8:84fab7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fab780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fab780 r8:80287e08 r7:eba81e60 r6:84fab800 r5:855e2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba85fb0 to 0xeba85ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f3d200
INFO: task kworker/1:826:5467 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cc496000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:827:5469 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:827   state:D stack:0     pid:5469  tgid:5469  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba89d84 r8:00000002 r7:60000013 r6:eba89d8c r5:855e8000
 r4:855e8000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855e8000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba89e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3d4c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb723000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85614b8c r4:85614800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85614b8c r4:84fab900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855e8000 r8:84fab92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fab900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fab900 r8:80287e08 r7:eba85e60 r6:84fab980 r5:855e8000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba89fb0 to 0xeba89ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f3d100
INFO: task kworker/1:827:5469 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cc496000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:828:5471 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:828   state:D stack:0     pid:5471  tgid:5471  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba8dd84 r8:00000002 r7:60000013 r6:eba8dd8c r5:855e8c00
 r4:855e8c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855e8c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba8de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3d340
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb707000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8561478c r4:85614400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8561478c r4:84faba00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855e8c00 r8:84faba2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84faba00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84faba00 r8:80287e08 r7:eba89e60 r6:84fabb80 r5:855e8c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba8dfb0 to 0xeba8dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f3d440
INFO: task kworker/1:828:5471 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cc887000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:829:5472 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:829   state:D stack:0     pid:5472  tgid:5472  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba95d84 r8:00000002 r7:60000013 r6:eba95d8c r5:855e9800
 r4:855e9800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855e9800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba95e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3d6c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb73d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85614f8c r4:85614c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85614f8c r4:84faba80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855e9800 r8:84fabaac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84faba80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84faba80 r8:80287e08 r7:eba89e60 r6:84fabc80 r5:855e9800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba95fb0 to 0xeba95ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f3d5c0
INFO: task kworker/1:829:5472 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ccb42000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:830:5475 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:830   state:D stack:0     pid:5475  tgid:5475  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba91d84 r8:00000002 r7:60000113 r6:eba91d8c r5:855ea400
 r4:855ea400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855ea400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba91e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3d800
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb759000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8561538c r4:85615000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8561538c r4:84fabc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855ea400 r8:84fabc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fabc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fabc00 r8:80287e08 r7:eba95e60 r6:84fabd00 r5:855ea400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba91fb0 to 0xeba91ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f3d680
INFO: task kworker/1:830:5475 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cceab000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:831:5477 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:831   state:D stack:0     pid:5477  tgid:5477  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba9dd84 r8:00000002 r7:60000113 r6:eba9dd8c r5:855eb000
 r4:855eb000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855eb000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba9de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3d9c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb7a3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8561578c r4:85615400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8561578c r4:84fabb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855eb000 r8:84fabb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fabb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fabb00 r8:80287e08 r7:eba91e60 r6:84fabe80 r5:855eb000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba9dfb0 to 0xeba9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f3d740
INFO: task kworker/1:831:5477 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cceab000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:340:5478 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:340   state:D stack:0     pid:5478  tgid:5478  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebaa5d84 r8:00000002 r7:60000113 r6:ebaa5d8c r5:8558b000
 r4:8558b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8558b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85476040
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8558b000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb949000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85644b8c r4:85644800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85644b8c r4:85384580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8558b000 r8:853845ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85384580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85384580 r8:80287e08 r7:eba61e60 r6:85384600 r5:8558b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebaa5fb0 to 0xebaa5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85370940
INFO: task kworker/0:340:5478 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cd326000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:832:5480 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:832   state:D stack:0     pid:5480  tgid:5480  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebaadd84 r8:00000002 r7:60000013 r6:ebaadd8c r5:8558c800
 r4:8558c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8558c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaade08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3db40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8558c800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb7b5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85615b8c r4:85615800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85615b8c r4:84fabd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8558c800 r8:84fabdac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fabd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fabd80 r8:80287e08 r7:eba9de60 r6:85384500 r5:8558c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebaadfb0 to 0xebaadff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f3d980
INFO: task kworker/1:832:5480 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cd413000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:833:5482 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:833   state:D stack:0     pid:5482  tgid:5482  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebab5d84 r8:00000002 r7:60000013 r6:ebab5d8c r5:8558d400
 r4:8558d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8558d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3dbc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8558d400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb933000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85615f8c r4:85615c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85615f8c r4:84fabe00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8558d400 r8:84fabe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fabe00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fabe00 r8:80287e08 r7:ebaade60 r6:85384680 r5:8558d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebab5fb0 to 0xebab5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f3db00
INFO: task kworker/1:833:5482 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cd413000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:834:5483 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:834   state:D stack:0     pid:5483  tgid:5483  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebab9d84 r8:00000002 r7:60000113 r6:ebab9d8c r5:8558bc00
 r4:8558bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8558bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3de40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8558bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb959000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8561638c r4:85616000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8561638c r4:84fabf80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8558bc00 r8:84fabfac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fabf80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fabf80 r8:80287e08 r7:ebab5e60 r6:85384700 r5:8558bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebab9fb0 to 0xebab9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f3dcc0
INFO: task kworker/1:834:5483 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cd9b1000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:835:5487 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:835   state:D stack:0     pid:5487  tgid:5487  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebaa1d84 r8:00000002 r7:60000013 r6:ebaa1d8c r5:8558e000
 r4:8558e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8558e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85370940
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8558e000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb965000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8561678c r4:85616400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8561678c r4:8546f000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8558e000 r8:8546f02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8546f000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8546f000 r8:80287e08 r7:ebab9e60 r6:85384780 r5:8558e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebaa1fb0 to 0xebaa1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84f3de00
INFO: task kworker/1:835:5487 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cd9b1000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:341:5488 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:341   state:D stack:0     pid:5488  tgid:5488  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebabdd84 r8:00000002 r7:60000113 r6:ebabdd8c r5:8558ec00
 r4:8558ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8558ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebabde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85476340
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8558ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb997000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85644f8c r4:85644c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85644f8c r4:85384900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8558ec00 r8:8538492c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85384900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85384900 r8:80287e08 r7:eba61e60 r6:85384800 r5:8558ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebabdfb0 to 0xebabdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85476140
INFO: task kworker/0:341:5488 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cdcc9000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:836:5489 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:836   state:D stack:0     pid:5489  tgid:5489  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebac1d84 r8:00000002 r7:60000113 r6:ebac1d8c r5:8558a400
 r4:8558a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8558a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4000
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8558a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebac9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85616b8c r4:85616800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85616b8c r4:8546f080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8558a400 r8:8546f0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8546f080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8546f080 r8:80287e08 r7:ebaa1e60 r6:85384880 r5:8558a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebac1fb0 to 0xebac1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853700c0
INFO: task kworker/1:836:5489 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cdcc9000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:343:5495 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:343   state:D stack:0     pid:5495  tgid:5495  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebac5d84 r8:00000002 r7:60000113 r6:ebac5d8c r5:85589800
 r4:85589800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85589800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85476500
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85589800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb9d3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8564578c r4:85645400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8564578c r4:85384a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85589800 r8:85384aac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85384a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85384a80 r8:80287e08 r7:ebab1e60 r6:85384b00 r5:85589800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebac5fb0 to 0xebac5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85476540
INFO: task kworker/0:343:5495 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ce415000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:837:5497 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:837   state:D stack:0     pid:5497  tgid:5497  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba99d84 r8:00000002 r7:60000013 r6:eba99d8c r5:84e24800
 r4:84e24800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84e24800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba99e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4200
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84e24800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebad3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85616f8c r4:85616c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85616f8c r4:8546f200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84e24800 r8:8546f22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8546f200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8546f200 r8:80287e08 r7:ebac1e60 r6:85384b80 r5:84e24800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba99fb0 to 0xeba99ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853f4080
INFO: task kworker/1:837:5497 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ce415000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:344:5498 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:344   state:D stack:0     pid:5498  tgid:5498  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebad9d84 r8:00000002 r7:60000113 r6:ebad9d8c r5:84e25400
 r4:84e25400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84e25400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85601500
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84e25400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebb7f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85645b8c r4:85645800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85645b8c r4:85384c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84e25400 r8:85384c2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85384c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85384c00 r8:80287e08 r7:ebab1e60 r6:85384c80 r5:84e25400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebad9fb0 to 0xebad9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854766c0
INFO: task kworker/0:344:5498 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ce4f1000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:838:5500 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:838   state:D stack:0     pid:5500  tgid:5500  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebae5d84 r8:00000002 r7:60000113 r6:ebae5d8c r5:84d60c00
 r4:84d60c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d60c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4340
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d60c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebadd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8561738c r4:85617000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8561738c r4:8546f280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d60c00 r8:8546f2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8546f280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8546f280 r8:80287e08 r7:eba99e60 r6:85384d00 r5:84d60c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebae5fb0 to 0xebae5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853f41c0
INFO: task kworker/1:838:5500 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ce4f1000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:839:5502 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:839   state:D stack:0     pid:5502  tgid:5502  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebaf1d84 r8:00000002 r7:60000113 r6:ebaf1d8c r5:84d62400
 r4:84d62400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d62400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f43c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d62400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebaf3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8561778c r4:85617400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8561778c r4:8546f300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d62400 r8:8546f32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8546f300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8546f300 r8:80287e08 r7:ebae5e60 r6:85384d80 r5:84d62400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebaf1fb0 to 0xebaf1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853f4280
INFO: task kworker/1:839:5502 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   ce8ee000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:840:5504 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:840   state:D stack:0     pid:5504  tgid:5504  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb05d84 r8:00000002 r7:60000113 r6:ebb05d8c r5:84d61800
 r4:84d61800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d61800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb05e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4700
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d61800 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebb0f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85617f8c r4:85617c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85617f8c r4:8546f380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d61800 r8:8546f3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8546f380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8546f380 r8:80287e08 r7:ebaf1e60 r6:85384e00 r5:84d61800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb05fb0 to 0xebb05ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853f4400
INFO: task kworker/1:840:5504 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cf133000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:841:5506 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:841   state:D stack:0     pid:5506  tgid:5506  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb0dd84 r8:00000002 r7:60000113 r6:ebb0dd8c r5:84d63c00
 r4:84d63c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d63c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb0de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4580
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d63c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebaf9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85617b8c r4:85617800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85617b8c r4:8546f180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d63c00 r8:8546f1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8546f180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8546f180 r8:80287e08 r7:ebb05e60 r6:85384e80 r5:84d63c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb0dfb0 to 0xebb0dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853f4400
INFO: task kworker/1:841:5506 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cf133000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:842:5508 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:842   state:D stack:0     pid:5508  tgid:5508  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb1dd84 r8:00000002 r7:60000113 r6:ebb1dd8c r5:84d60000
 r4:84d60000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d60000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb1de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4880
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d60000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebb15000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8561c38c r4:8561c000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8561c38c r4:8546f400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d60000 r8:8546f42c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8546f400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8546f400 r8:80287e08 r7:ebb05e60 r6:85384f00 r5:84d60000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb1dfb0 to 0xebb1dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853f44c0
INFO: task kworker/1:842:5508 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cf4f5000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:843:5510 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:843   state:D stack:0     pid:5510  tgid:5510  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb35d84 r8:00000002 r7:60000013 r6:ebb35d8c r5:84d64800
 r4:84d64800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d64800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb35e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85476d00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d64800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebb65000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8561db8c r4:8561d800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8561db8c r4:8546f500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d64800 r8:8546f52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8546f500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8546f500 r8:80287e08 r7:ebb1de60 r6:85384f80 r5:84d64800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb35fb0 to 0xebb35ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853f4840
INFO: task kworker/1:843:5510 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cfeba000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:844:5512 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:844   state:D stack:0     pid:5512  tgid:5512  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb39d84 r8:00000002 r7:60000113 r6:ebb39d8c r5:84d66000
 r4:84d66000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d66000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb39e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4940
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d66000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebb27000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8561c78c r4:8561c400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8561c78c r4:8546f480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d66000 r8:8546f4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8546f480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8546f480 r8:80287e08 r7:ebb35e60 r6:85600000 r5:84d66000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb39fb0 to 0xebb39ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853f4840
INFO: task kworker/1:844:5512 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cfeba000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:845:5513 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:845   state:D stack:0     pid:5513  tgid:5513  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb41d84 r8:00000002 r7:60000013 r6:ebb41d8c r5:84d65400
 r4:84d65400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d65400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb41e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4840
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d65400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebb2d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8561cb8c r4:8561c800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8561cb8c r4:8546f580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d65400 r8:8546f5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8546f580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8546f580 r8:80287e08 r7:ebb35e60 r6:85600080 r5:84d65400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb41fb0 to 0xebb41ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853f4980
INFO: task kworker/1:845:5513 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cfeba000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:846:5515 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:846   state:D stack:0     pid:5515  tgid:5515  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb51d84 r8:00000002 r7:60000113 r6:ebb51d8c r5:85680000
 r4:85680000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85680000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb51e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4c00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85680000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebb47000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8561cf8c r4:8561cc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8561cf8c r4:8546f680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85680000 r8:8546f6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8546f680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8546f680 r8:80287e08 r7:ebb35e60 r6:85600100 r5:85680000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb51fb0 to 0xebb51ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853f4ac0
INFO: task kworker/1:846:5515 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cfeba000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:847:5517 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:847   state:D stack:0     pid:5517  tgid:5517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebacdd84 r8:00000002 r7:60000113 r6:ebacdd8c r5:855ebc00
 r4:855ebc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855ebc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebacde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4d40
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebb4d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8561d38c r4:8561d000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8561d38c r4:8546f700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855ebc00 r8:8546f72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8546f700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8546f700 r8:80287e08 r7:ebb35e60 r6:8546f780 r5:855ebc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebacdfb0 to 0xebacdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853f4b40
INFO: task kworker/1:847:5517 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   cfeba000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:848:5520 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:848   state:D stack:0     pid:5520  tgid:5520  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb5dd84 r8:00000002 r7:60000113 r6:ebb5dd8c r5:855ed400
 r4:855ed400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855ed400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb5de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4ec0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebb5f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8561d78c r4:8561d400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8561d78c r4:8546f100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855ed400 r8:8546f12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8546f100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8546f100 r8:80287e08 r7:ebb35e60 r6:8546f800 r5:855ed400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb5dfb0 to 0xebb5dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854769c0
INFO: task kworker/1:848:5520 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d0623000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:849:5523 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:849   state:D stack:0     pid:5523  tgid:5523  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebae1d84 r8:00000002 r7:60000013 r6:ebae1d8c r5:855eec00
 r4:855eec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855eec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4c80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebb73000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8561df8c r4:8561dc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8561df8c r4:8546f880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855eec00 r8:8546f8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8546f880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8546f880 r8:80287e08 r7:ebb35e60 r6:8546f980 r5:855eec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebae1fb0 to 0xebae1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853f4f40
INFO: task kworker/1:849:5523 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d0dfc000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:850:5525 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:850   state:D stack:0     pid:5525  tgid:5525  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb69d84 r8:00000002 r7:60000013 r6:ebb69d8c r5:855f0000
 r4:855f0000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855f0000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb69e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9000
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebb79000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8561e38c r4:8561e000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8561e38c r4:8546f600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855f0000 r8:8546f62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8546f600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8546f600 r8:80287e08 r7:ebae1e60 r6:8546fa80 r5:855f0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb69fb0 to 0xebb69ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:856b9080
INFO: task kworker/1:850:5525 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d0dfc000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:851:5526 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:851   state:D stack:0     pid:5526  tgid:5526  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb8dd84 r8:00000002 r7:60000013 r6:ebb8dd8c r5:855f1800
 r4:855f1800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855f1800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb8de08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9440
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebb85000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8561e78c r4:8561e400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8561e78c r4:8546f900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855f1800 r8:8546f92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8546f900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8546f900 r8:80287e08 r7:ebb69e60 r6:8546fa00 r5:855f1800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb8dfb0 to 0xebb8dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:856b9280
INFO: task kworker/1:851:5526 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d0dfc000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:852:5529 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:852   state:D stack:0     pid:5529  tgid:5529  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb95d84 r8:00000002 r7:60000113 r6:ebb95d8c r5:855f0c00
 r4:855f0c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855f0c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb95e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9740
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebb9d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8561ef8c r4:8561ec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8561ef8c r4:8546fb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855f0c00 r8:8546fb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8546fb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8546fb00 r8:80287e08 r7:ebb8de60 r6:8546fc80 r5:855f0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb95fb0 to 0xebb95ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:856b9200
INFO: task kworker/1:852:5529 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d1819000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:853:5530 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:853   state:D stack:0     pid:5530  tgid:5530  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb71d84 r8:00000002 r7:60000013 r6:ebb71d8c r5:85682400
 r4:85682400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85682400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb71e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9600
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85682400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebb97000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8561eb8c r4:8561e800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8561eb8c r4:8546fb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85682400 r8:8546fbac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8546fb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8546fb80 r8:80287e08 r7:ebb95e60 r6:85600180 r5:85682400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb71fb0 to 0xebb71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:856b9200
INFO: task kworker/1:853:5530 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d1819000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:854:5533 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:854   state:D stack:0     pid:5533  tgid:5533  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebba9d84 r8:00000002 r7:60000113 r6:ebba9d8c r5:85680c00
 r4:85680c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85680c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebba9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9880
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85680c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebbab000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8561f38c r4:8561f000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8561f38c r4:8546fd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85680c00 r8:8546fdac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8546fd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8546fd80 r8:80287e08 r7:ebb95e60 r6:85600280 r5:85680c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebba9fb0 to 0xebba9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:856b9240
INFO: task kworker/1:854:5533 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d1819000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:855:5536 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:855   state:D stack:0     pid:5536  tgid:5536  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebbb9d84 r8:00000002 r7:60000013 r6:ebbb9d8c r5:85684800
 r4:85684800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85684800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9940
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85684800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebbb1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8561f78c r4:8561f400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8561f78c r4:8546fe00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85684800 r8:8546fe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8546fe00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8546fe00 r8:80287e08 r7:ebba9e60 r6:85600380 r5:85684800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbb9fb0 to 0xebbb9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:856b97c0
INFO: task kworker/1:855:5536 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d1819000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:856:5538 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:856   state:D stack:0     pid:5538  tgid:5538  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebbc5d84 r8:00000002 r7:60000113 r6:ebbc5d8c r5:85683c00
 r4:85683c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85683c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbc5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9a80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85683c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebbc7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8561fb8c r4:8561f800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8561fb8c r4:8546fe80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85683c00 r8:8546feac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8546fe80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8546fe80 r8:80287e08 r7:ebbb9e60 r6:85600400 r5:85683c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbc5fb0 to 0xebbc5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:856b9980
INFO: task kworker/1:856:5538 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d21ad000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:857:5540 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:857   state:D stack:0     pid:5540  tgid:5540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebbd9d84 r8:00000002 r7:60000013 r6:ebbd9d8c r5:85685400
 r4:85685400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85685400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbd9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9bc0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85685400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebbcd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8561ff8c r4:8561fc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8561ff8c r4:8546ff00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85685400 r8:8546ff2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8546ff00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8546ff00 r8:80287e08 r7:ebbc5e60 r6:85600480 r5:85685400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbd9fb0 to 0xebbd9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:856b99c0
INFO: task kworker/1:857:5540 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d21ad000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:858:5542 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:858   state:D stack:0     pid:5542  tgid:5542  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebbddd84 r8:00000002 r7:60000113 r6:ebbddd8c r5:85686c00
 r4:85686c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85686c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbdde08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9d80
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85686c00 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa77000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8562438c r4:85624000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8562438c r4:8546fd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85686c00 r8:8546fd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8546fd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8546fd00 r8:80287e08 r7:ebbd9e60 r6:85600500 r5:85686c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbddfb0 to 0xebbddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:856b9b00
INFO: task kworker/1:858:5542 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d24f3000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:859:5544 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:859   state:D stack:0     pid:5544  tgid:5544  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebbe1d84 r8:00000002 r7:60000113 r6:ebbe1d8c r5:85686000
 r4:85686000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85686000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe1e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9200
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85686000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eacef000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85624b8c r4:85624800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85624b8c r4:855b1a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85686000 r8:855b1a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:855b1a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b1a00 r8:80287e08 r7:ebbdde60 r6:85600580 r5:85686000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbe1fb0 to 0xebbe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:856b9d40
INFO: task kworker/1:859:5544 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d24f3000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:860:5546 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:860   state:D stack:0     pid:5546  tgid:5546  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebbe5d84 r8:00000002 r7:60000013 r6:ebbe5d8c r5:85683000
 r4:85683000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85683000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe5e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9ec0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85683000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0533000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8562478c r4:85624400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8562478c r4:84fabf00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85683000 r8:84fabf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84fabf00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84fabf00 r8:80287e08 r7:ebbe1e60 r6:85600600 r5:85683000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbe5fb0 to 0xebbe5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:856b9c40
INFO: task kworker/1:860:5546 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d2c5c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:861:5548 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:861   state:D stack:0     pid:5548  tgid:5548  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebbe9d84 r8:00000002 r7:60000013 r6:ebbe9d8c r5:84d66c00
 r4:84d66c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d66c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe9e08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bc000
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d66c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaec3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85624f8c r4:85624c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85624f8c r4:856bd000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d66c00 r8:856bd02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:856bd000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:856bd000 r8:80287e08 r7:ebbe1e60 r6:85600680 r5:84d66c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbe9fb0 to 0xebbe9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:856b9f40
INFO: task kworker/1:861:5548 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d2c5c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:862:5551 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:862   state:D stack:0     pid:5551  tgid:5551  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebbedd84 r8:00000002 r7:60000113 r6:ebbedd8c r5:84d63000
 r4:84d63000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84d63000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbede08
 r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bc1c0
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84d63000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb025000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8562538c r4:85625000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8562538c r4:856bd080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d63000 r8:856bd0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:856bd080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:856bd080 r8:80287e08 r7:ebbe9e60 r6:85600700 r5:84d63000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbedfb0 to 0xebbedff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:856bc0c0
INFO: task kworker/1:862:5551 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123   state:R  running task     stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
 r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20:                   d2c5c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
 r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
 r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT 
Hardware name: ARM-Versatile Express
Call trace: 
[<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257)
 r7:00000000 r6:00070013 r5:60070093 r4:82257e00
[<80201ac8>] (show_stack) from [<8022003c>] (__dump_stack lib/dump_stack.c:94 [inline])
[<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120)
[<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c lib/dump_stack.c:129)
 r5:00000000 r4:00000001
[<80220048>] (dump_stack) from [<81a3d08c>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113)
[<81a3cf2c>] (nmi_cpu_backtrace) from [<81a3d1d8>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62)
 r7:00000000 r6:8280c610 r5:8281af00 r4:ffffffff
[<81a3d0a8>] (nmi_trigger_cpumask_backtrace) from [<802304dc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852)
 r9:0000ea92 r8:82ab6564 r7:8280c788 r6:00007766 r5:8281b4c8 r4:85d86f0c
[<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386da8>] (trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline])
[<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386da8>] (check_hung_uninterruptible_tasks kernel/hung_task.c:274 [inline])
[<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386da8>] (watchdog+0x4a8/0x69c kernel/hung_task.c:437)
[<80386900>] (watchdog) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:80386900 r7:83348780 r6:83348780 r5:83251800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf8e1fb0 to 0xdf8e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8334b500
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 2820 Comm: pr/ttyAMA0 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT 
Hardware name: ARM-Versatile Express
PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline]
PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194
LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]
LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:614 [inline]
LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603
pc : [<81a5c2ac>]    lr : [<80a629ec>]    psr: 60070013
sp : ebe39eb0  ip : ebe39ec0  fp : ebe39ebc
r10: 8295b3bc  r9 : 00000001  r8 : 00000000
r7 : 00000117  r6 : 8295b320  r5 : 00000000  r4 : 00000001
r3 : 0000e1f8  r2 : 00000000  r1 : 60070013  r0 : 842e5440
Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment none
Control: 30c5387d  Table: 847b3d40  DAC: 00000000
Call trace: 
[<81a5c284>] (_raw_spin_unlock_irqrestore) from [<80a629ec>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline])
[<81a5c284>] (_raw_spin_unlock_irqrestore) from [<80a629ec>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:614 [inline])
[<81a5c284>] (_raw_spin_unlock_irqrestore) from [<80a629ec>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603)
[<80a629cc>] (pl011_console_device_unlock) from [<802efd14>] (nbcon_emit_one+0x80/0xf8 kernel/printk/nbcon.c:1123)
[<802efc94>] (nbcon_emit_one) from [<802eff34>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1210)
 r6:8280c610 r5:84696000 r4:8295b320
[<802efd8c>] (nbcon_kthread_func) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8295b320 r8:802efd8c r7:843eb400 r6:843eb400 r5:84696000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe39fb0 to 0xebe39ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:83944240

Crashes (520):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/05/17 05:00 upstream 3c21441eeffc f41472b0 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/14 22:35 upstream 9f35e33144ae a4fa04ef .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/14 09:15 upstream 405e6c37c89e 7344edeb .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/13 18:30 upstream e9565e23cd89 9497799b .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/12 07:31 upstream cd802e7e5f1e 77908e5f .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/11 14:09 upstream 3ce9925823c7 77908e5f .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/10 19:36 upstream 1a33418a69cc 77908e5f .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/10 08:55 upstream 0e1329d4045c 77908e5f .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/09 07:50 upstream 2c89c1b655c0 bb813bcc .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/08 02:38 upstream 707df3375124 dbf35fa1 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/25 00:39 upstream 28eb75e178d3 4dfba277 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/24 08:49 upstream 28eb75e178d3 4dfba277 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/12 11:02 upstream 2d5404caa8c7 75bb1b32 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/04 08:32 upstream a33ab3f94f51 f00eed24 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/03 18:58 upstream 3e5e6c9900c3 f00eed24 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/03 04:29 upstream 11066801dd4b f00eed24 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/02 15:05 upstream c426456857fa f00eed24 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/26 21:47 upstream 850925a8133c 65e8686b .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/08 16:32 upstream 87d6aab2389e 402f1df0 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/07 17:02 upstream 8cf0b93919e1 d7906eff .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/07 12:53 upstream 8cf0b93919e1 d7906eff .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/29 13:37 upstream 3efc57369a0c ba29ff75 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/20 23:19 upstream baeb9a7d8b60 6f888b75 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/04 13:06 upstream 88fac17500f4 9d47f20a .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/08/26 11:06 upstream 5be63fc19fca d7d32352 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/08/26 09:52 upstream 5be63fc19fca d7d32352 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/08/26 06:56 upstream 5be63fc19fca d7d32352 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/08/25 16:35 upstream 780bdc1ba776 d7d32352 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/05/30 14:11 upstream 4a4be1ad3a6e 34889ee3 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/05/02 10:41 upstream 0106679839f7 3ba885bc .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/04/02 19:56 upstream 026e680b0a08 f861ecca .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/03/27 15:06 upstream 7033999ecd7b 454571b6 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/03/27 06:52 upstream 7033999ecd7b 454571b6 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/03/25 04:41 upstream 5e74df2f8f15 0ea90952 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/03/05 10:51 upstream 90d35da658da 5fc53669 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/02/06 07:42 upstream 54be6c6c5ae8 6404acf9 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/01/29 16:08 upstream 41bccc98fb79 991a98f4 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/01/28 16:09 upstream 8a696a29c690 cc4a4020 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/01/28 11:47 upstream 8a696a29c690 cc4a4020 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/01/03 12:03 upstream 610a9b8f49fb fb427a07 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/08 00:10 upstream 707df3375124 dbf35fa1 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/21 10:41 upstream 43fb83c17ba2 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/20 22:30 upstream bf9aa14fc523 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/20 19:17 upstream bf9aa14fc523 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/19 16:05 upstream 158f238aa69d 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/19 03:30 upstream 23acd177540d 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/18 07:48 upstream adc218676eef 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/17 18:27 upstream 4a5df3796467 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/17 04:07 upstream b5a24181e461 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/13 20:06 upstream f1b785f4c787 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/11 02:51 upstream a9cda7c0ffed 6b856513 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/10 12:13 upstream de2f378f2b77 6b856513 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/10 01:27 upstream da4373fbcf00 6b856513 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/08 10:22 upstream 906bd684e4b1 179b040e .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/03 13:52 upstream 3e5e6c9900c3 f00eed24 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/02 12:22 upstream c426456857fa f00eed24 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/29 06:31 upstream e42b1a9a2557 66aeb999 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/20 11:21 upstream 715ca9dd687f cd6fc0a3 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/16 04:53 upstream 2f87d0916ce0 bde2d81c .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/12 19:20 upstream 09f6b0c8904b 084d8178 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/11 17:36 upstream 1d227fcc7222 5e7b4bca .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/10 22:47 upstream 1d227fcc7222 cd942402 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/10 18:09 upstream d3d1556696c1 d44647df .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/10 07:06 upstream b983b271662b 0278d004 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/09 17:31 upstream 75b607fab38d 56fb2cb7 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/07 08:05 upstream 8cf0b93919e1 d7906eff .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/05 16:35 upstream 27cc6fdf7201 d7906eff .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/04 07:51 upstream 0c559323bbaa d7906eff .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/03 18:26 upstream 7ec462100ef9 d7906eff .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/24 07:04 upstream 18ba6034468e 89298aad .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/18 12:26 upstream 2f27fce67173 c673ca06 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/06 11:09 upstream ad618736883b 464ac2ed .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/06 10:02 upstream ad618736883b 464ac2ed .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/05 21:28 upstream c763c4339688 464ac2ed .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/05 06:34 upstream c7fb1692dc01 dfbe2ed4 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/04 10:59 upstream 88fac17500f4 9d47f20a .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/04 09:31 upstream 88fac17500f4 9d47f20a .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/04 09:16 upstream 88fac17500f4 9d47f20a .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/04 08:14 upstream 88fac17500f4 9d47f20a .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/03 18:42 upstream 67784a74e258 8045124c .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/03 05:47 upstream 67784a74e258 abeaa9b9 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2023/12/25 04:12 upstream 861deac3b092 fb427a07 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
* Struck through repros no longer work on HEAD.