INFO: task kworker/0:10:13012 blocked for more than 430 seconds.
      Not tainted 6.11.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:10    state:D stack:0     pid:13012 tgid:13012 ppid:2      flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<8197ed48>] (__schedule) from [<8197f8e0>] (__schedule_loop kernel/sched/core.c:6606 [inline])
[<8197ed48>] (__schedule) from [<8197f8e0>] (schedule+0x2c/0xfc kernel/sched/core.c:6621)
 r10:8260ca7c r9:00000000 r8:82714ab8 r7:00000002 r6:e0209da4 r5:83e96c00
 r4:83e96c00
[<8197f8b4>] (schedule) from [<8197fc94>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6678)
 r5:83e96c00 r4:82714ab4
[<8197fc7c>] (schedule_preempt_disabled) from [<8198276c>] (__mutex_lock_common kernel/locking/mutex.c:684 [inline])
[<8197fc7c>] (schedule_preempt_disabled) from [<8198276c>] (__mutex_lock.constprop.0+0x2e8/0xae0 kernel/locking/mutex.c:752)
[<81982484>] (__mutex_lock.constprop.0) from [<81983038>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1040)
 r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0209e20
 r4:00000000
[<81983024>] (__mutex_lock_slowpath) from [<81983078>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:286)
[<8198303c>] (mutex_lock) from [<804a6490>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2846)
[<804a6428>] (_vm_unmap_aliases) from [<804aa1e8>] (vm_reset_perms mm/vmalloc.c:3275 [inline])
[<804a6428>] (_vm_unmap_aliases) from [<804aa1e8>] (vfree+0x170/0x1e4 mm/vmalloc.c:3354)
 r10:82c16005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b85c0
 r4:00000000
[<804aa078>] (vfree) from [<80501a18>] (execmem_free+0x30/0x64 mm/execmem.c:69)
 r9:83e96c00 r8:00800000 r7:00000000 r6:82c16000 r5:00001000 r4:7f003000
[<805019e8>] (execmem_free) from [<80393a3c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1072)
 r5:00001000 r4:dfb2b000
[<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_binary_free kernel/bpf/core.c:1118 [inline])
[<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1241)
[<80393db4>] (bpf_jit_free) from [<80394f58>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2800)
 r5:853a2f54 r4:853a2c00
[<80394e0c>] (bpf_prog_free_deferred) from [<80265f08>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3231)
 r7:dddd0000 r6:82c16000 r5:853a2f54 r4:85205b80
[<80265d54>] (process_one_work) from [<80266aec>] (process_scheduled_works kernel/workqueue.c:3312 [inline])
[<80265d54>] (process_one_work) from [<80266aec>] (worker_thread+0x1ec/0x3b4 kernel/workqueue.c:3389)
 r10:83e96c00 r9:85205bac r8:61c88647 r7:dddd0020 r6:82604d40 r5:dddd0000
 r4:85205b80
[<80266900>] (worker_thread) from [<8026fb04>] (kthread+0x104/0x134 kernel/kthread.c:389)
 r10:00000000 r9:df9e5e78 r8:85343a00 r7:85205b80 r6:80266900 r5:83e96c00
 r4:85215580
[<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0209fb0 to 0xe0209ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:85215580
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.11.0-rc6-syzkaller #0
Hardware name: ARM-Versatile Express
Call trace: 
[<8195d160>] (dump_backtrace) from [<8195d25c>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257)
 r7:00000000 r6:00000113 r5:60000193 r4:8200ca8c
[<8195d244>] (show_stack) from [<8197af9c>] (__dump_stack lib/dump_stack.c:93 [inline])
[<8195d244>] (show_stack) from [<8197af9c>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:119)
[<8197af2c>] (dump_stack_lvl) from [<8197afc0>] (dump_stack+0x18/0x1c lib/dump_stack.c:128)
 r5:00000001 r4:00000001
[<8197afa8>] (dump_stack) from [<8194a450>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113)
[<8194a2f0>] (nmi_cpu_backtrace) from [<8194a59c>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62)
 r7:00000001 r6:8260c5d0 r5:8261a88c r4:ffffffff
[<8194a46c>] (nmi_trigger_cpumask_backtrace) from [<802103c8>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:851)
 r9:0002cfc1 r8:828b3130 r7:8260c734 r6:00007e19 r5:8261ae48 r4:8583d41c
[<802103b0>] (arch_trigger_cpumask_backtrace) from [<80350e30>] (trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline])
[<802103b0>] (arch_trigger_cpumask_backtrace) from [<80350e30>] (check_hung_uninterruptible_tasks kernel/hung_task.c:223 [inline])
[<802103b0>] (arch_trigger_cpumask_backtrace) from [<80350e30>] (watchdog+0x498/0x5b8 kernel/hung_task.c:379)
[<80350998>] (watchdog) from [<8026fb04>] (kthread+0x104/0x134 kernel/kthread.c:389)
 r10:00000000 r9:df819e58 r8:82e9e400 r7:00000000 r6:80350998 r5:82ee8c00
 r4:82f44d00
[<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf8e1fb0 to 0xdf8e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:82f44d00
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 2926 Comm: klogd Not tainted 6.11.0-rc6-syzkaller #0
Hardware name: ARM-Versatile Express
PC is at 0x76d580d0
LR is at 0x76d3d6e0
pc : [<76d580d0>]    lr : [<76d3d6e0>]    psr: 20000010
sp : 7ed0eb80  ip : 76e20e70  fp : 76e20e60
r10: 76e20e60  r9 : 00000013  r8 : 00000077
r7 : 76e1fa54  r6 : 01eb1018  r5 : 7ed0ebf4  r4 : 01ea41a8
r3 : 00000001  r2 : 000005e8  r1 : 00000077  r0 : 01eb1018
Flags: nzCv  IRQs on  FIQs on  Mode USER_32  ISA ARM  Segment user
Control: 30c5387d  Table: 84391740  DAC: fffffffd
Call trace: invalid frame pointer 0x76e20e60