Extracting prog: 11m47.185316452s
Minimizing prog: 1h25m52.739612043s
Simplifying prog options: 0s
Extracting C: 9m2.058087422s
Simplifying C: 55m23.756908879s


extracting reproducer from 1 programs
testing a last program of every proc
single: executing 1 programs separately with timeout 45s
testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-ioctl$sock_SIOCGIFINDEX
detailed listing:
executing program 0:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0)

program did not crash
single: failed to extract reproducer
single: executing 1 programs separately with timeout 16m0s
testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-ioctl$sock_SIOCGIFINDEX
detailed listing:
executing program 0:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0)

program crashed: INFO: task hung in _vm_unmap_aliases
single: successfully extracted reproducer
found reproducer with 3 syscalls
minimizing guilty program
testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN
detailed listing:
executing program 0:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10)

program crashed: INFO: task hung in _vm_unmap_aliases
testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD
detailed listing:
executing program 0:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90)

program crashed: INFO: task hung in _vm_unmap_aliases
testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD
detailed listing:
executing program 0:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)

program did not crash
testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD
detailed listing:
executing program 0:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, 0x0, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)

program did not crash
testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD
detailed listing:
executing program 0:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)

program did not crash
testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD
detailed listing:
executing program 0:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)

program did not crash
extracting C reproducer
testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD
program crashed: INFO: task hung in _vm_unmap_aliases
simplifying C reproducer
testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD
program crashed: INFO: task hung in _vm_unmap_aliases
testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD
program crashed: INFO: task hung in _vm_unmap_aliases
testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD
program crashed: INFO: task hung in _vm_unmap_aliases
testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD
program crashed: INFO: task hung in _vm_unmap_aliases
testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD
program crashed: INFO: task hung in _vm_unmap_aliases
testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD
program crashed: INFO: task hung in _vm_unmap_aliases
reproducing took 2h42m5.739962767s
repro crashed as (corrupted=false):
INFO: task kworker/0:0:9 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:0     state:D stack:0     pid:9     tgid:9     ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df83dd84 r8:00000002 r7:60000113 r6:df83dd8c r5:83236000
 r4:83236000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83236000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df83de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c3a40
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83236000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb9d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84379f8c r4:84379c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84379f8c r4:830b8400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83236000 r8:830b842c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:830b8400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:830b8400 r8:80287e08 r7:df819e48 r6:830b8480 r5:83236000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf83dfb0 to 0xdf83dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:830b51c0
INFO: task kworker/0:0:9 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   adac4000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
INFO: task kworker/0:4:3046 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:4     state:D stack:0     pid:3046  tgid:3046  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec7a9d84 r8:00000002 r7:60000113 r6:ec7a9d8c r5:84543000
 r4:84543000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84543000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7a9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84832280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84543000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e00e9000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84901f8c r4:84901c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84901f8c r4:847d1080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84543000 r8:847d10ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847d1080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847d1080 r8:80287e08 r7:df841e60 r6:84795300 r5:84543000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec7a9fb0 to 0xec7a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84309ec0
INFO: task kworker/0:4:3046 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   ae9b9000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
INFO: task kworker/1:0:3110 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:0     state:D stack:0     pid:3110  tgid:3110  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df9a9d84 r8:00000002 r7:60000013 r6:df9a9d8c r5:84156000
 r4:84156000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84156000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9a9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e9b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84156000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa33000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852df78c r4:852df400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852df78c r4:84795800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84156000 r8:8479582c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84795800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84795800 r8:80287e08 r7:eaf51e60 r6:84795a00 r5:84156000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9a9fb0 to 0xdf9a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8338ea40
INFO: task kworker/1:0:3110 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   af95b000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
INFO: task kworker/0:5:3114 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:5     state:D stack:0     pid:3114  tgid:3114  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df9c1d84 r8:00000002 r7:60000113 r6:df9c1d8c r5:84543c00
 r4:84543c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84543c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c1e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc040
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84543c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0113000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:844b5b8c r4:844b5800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:844b5b8c r4:847e2200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84543c00 r8:847e222c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847e2200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847e2200 r8:80287e08 r7:ec7a9e60 r6:84795980 r5:84543c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9c1fb0 to 0xdf9c1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:83902840
INFO: task kworker/0:5:3114 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   af95b000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
INFO: task kworker/0:6:3118 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:6     state:D stack:0     pid:3118  tgid:3118  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df9d1d84 r8:00000002 r7:60000113 r6:df9d1d8c r5:84156c00
 r4:84156c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84156c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d1e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84936c80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84156c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb83000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:844b678c r4:844b6400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:844b678c r4:847e2280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84156c00 r8:847e22ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847e2280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847e2280 r8:80287e08 r7:ec7a9e60 r6:84795c80 r5:84156c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9d1fb0 to 0xdf9d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:842f4d00
INFO: task kworker/0:6:3118 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   afda0000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
INFO: task kworker/0:7:3120 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:7     state:D stack:0     pid:3120  tgid:3120  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df9e1d84 r8:00000002 r7:60000113 r6:df9e1d8c r5:84542400
 r4:84542400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84542400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e1e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84953400
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84542400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfaa1000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84395f8c r4:84395c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84395f8c r4:847e2300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84542400 r8:847e232c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847e2300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847e2300 r8:80287e08 r7:ec7a9e60 r6:84795c00 r5:84542400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9e1fb0 to 0xdf9e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:848320c0
INFO: task kworker/0:7:3120 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b031f000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
INFO: task kworker/0:8:3123 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:8     state:D stack:0     pid:3123  tgid:3123  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df9f9d84 r8:00000002 r7:60000113 r6:df9f9d8c r5:841abc00
 r4:841abc00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:841abc00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85031cc0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:841abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df965000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84900b8c r4:84900800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84900b8c r4:847e2380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:841abc00 r8:847e23ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847e2380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847e2380 r8:80287e08 r7:ec7a9e60 r6:84795e00 r5:841abc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9f9fb0 to 0xdf9f9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84832140
INFO: task kworker/0:8:3123 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b031f000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
INFO: task kworker/0:9:3124 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:9     state:D stack:0     pid:3124  tgid:3124  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df96dd84 r8:00000002 r7:60000113 r6:df96dd8c r5:84579800
 r4:84579800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84579800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df96de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84945d00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84579800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd55000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:848ba38c r4:848ba000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:848ba38c r4:847e2400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84579800 r8:847e242c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847e2400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847e2400 r8:80287e08 r7:ec7a9e60 r6:847e2480 r5:84579800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf96dfb0 to 0xdf96dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84832280
INFO: task kworker/0:9:3124 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b05c7000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
INFO: task kworker/0:10:3127 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:10    state:D stack:0     pid:3127  tgid:3127  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:84578c00
 r4:84578c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84578c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493a8c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84578c00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfedf000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850a878c r4:850a8400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:850a878c r4:847e2500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84578c00 r8:847e252c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847e2500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847e2500 r8:80287e08 r7:ec7a9e60 r6:847e2580 r5:84578c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9f5fb0 to 0xdf9f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84832500
INFO: task kworker/0:10:3127 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b089c000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
INFO: task kworker/0:11:3128 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:11    state:D stack:0     pid:3128  tgid:3128  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df975d84 r8:00000002 r7:60000113 r6:df975d8c r5:8457d400
 r4:8457d400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8457d400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df975e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cac80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8457d400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd73000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84903f8c r4:84903c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84903f8c r4:847e2600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8457d400 r8:847e262c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847e2600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847e2600 r8:80287e08 r7:df9f5e60 r6:847e2680 r5:8457d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf975fb0 to 0xdf975ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84832800
INFO: task kworker/0:11:3128 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b0d70000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:12:3131 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:12    state:D stack:0     pid:3131  tgid:3131  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa15d84 r8:00000002 r7:60000113 r6:dfa15d8c r5:8457c800
 r4:8457c800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8457c800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa15e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ea000
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8457c800 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa1f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850a9b8c r4:850a9800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:850a9b8c r4:847e2700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8457c800 r8:847e272c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847e2700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847e2700 r8:80287e08 r7:df9f5e60 r6:847e2780 r5:8457c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa15fb0 to 0xdfa15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84832780
INFO: task kworker/0:12:3131 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b1219000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:13:3133 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:13    state:D stack:0     pid:3133  tgid:3133  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa29d84 r8:00000002 r7:60000113 r6:dfa29d8c r5:8457ec00
 r4:8457ec00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8457ec00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa29e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e4f80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8457ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9f1000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851c738c r4:851c7000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851c738c r4:847e2800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8457ec00 r8:847e282c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847e2800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847e2800 r8:80287e08 r7:dfa15e60 r6:847e2880 r5:8457ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa29fb0 to 0xdfa29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84832900
INFO: task kworker/0:13:3133 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b1219000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:14:3135 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:14    state:D stack:0     pid:3135  tgid:3135  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa31d84 r8:00000002 r7:60000113 r6:dfa31d8c r5:8457a400
 r4:8457a400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8457a400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522fd80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8457a400 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe27000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:850ab38c r4:850ab000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:850ab38c r4:847e2900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8457a400 r8:847e292c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847e2900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847e2900 r8:80287e08 r7:dfa29e60 r6:847e2980 r5:8457a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa31fb0 to 0xdfa31ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84832a80
INFO: task kworker/0:14:3135 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b1219000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:15:3137 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:15    state:D stack:0     pid:3137  tgid:3137  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa3dd84 r8:00000002 r7:60000113 r6:dfa3dd8c r5:83236c00
 r4:83236c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83236c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa3de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c8e80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83236c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa03000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851d538c r4:851d5000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851d538c r4:847e2a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83236c00 r8:847e2a2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847e2a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847e2a00 r8:80287e08 r7:dfa29e60 r6:847e2a80 r5:83236c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa3dfb0 to 0xdfa3dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84832c00
INFO: task kworker/0:15:3137 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b1a6e000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:16:3139 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:16    state:D stack:0     pid:3139  tgid:3139  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa45d84 r8:00000002 r7:60000113 r6:dfa45d8c r5:832fec00
 r4:832fec00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:832fec00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa45e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539d140
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:832fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf71000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8535d38c r4:8535d000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8535d38c r4:847e2b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:832fec00 r8:847e2b2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847e2b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847e2b00 r8:80287e08 r7:dfa3de60 r6:847e2b80 r5:832fec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa45fb0 to 0xdfa45ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84832dc0
INFO: task kworker/0:16:3139 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b1a6e000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:17:3140 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:17    state:D stack:0     pid:3140  tgid:3140  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa1dd84 r8:00000002 r7:60000013 r6:dfa1dd8c r5:832f8000
 r4:832f8000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:832f8000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa1de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852489c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:832f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa0d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851d6b8c r4:851d6800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851d6b8c r4:847e2c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:832f8000 r8:847e2c2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847e2c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847e2c00 r8:80287e08 r7:dfa45e60 r6:847e2c80 r5:832f8000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa1dfb0 to 0xdfa1dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8431b280
INFO: task kworker/0:17:3140 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b1fce000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:18:3142 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:18    state:D stack:0     pid:3142  tgid:3142  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa59d84 r8:00000002 r7:60000113 r6:dfa59d8c r5:832fe000
 r4:832fe000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:832fe000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d50c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:832fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06d3000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84af4b8c r4:84af4800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84af4b8c r4:847e2d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:832fe000 r8:847e2d2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847e2d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847e2d00 r8:80287e08 r7:dfa45e60 r6:847e2d80 r5:832fe000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa59fb0 to 0xdfa59ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845deac0
INFO: task kworker/0:18:3142 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b1fce000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:19:3146 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:19    state:D stack:0     pid:3146  tgid:3146  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:832f9800
 r4:832f9800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:832f9800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539de40
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:832f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0607000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8535df8c r4:8535dc00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8535df8c r4:847e2e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:832f9800 r8:847e2e2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847e2e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847e2e00 r8:80287e08 r7:dfa45e60 r6:847e2e80 r5:832f9800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa65fb0 to 0xdfa65ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84b3a380
INFO: task kworker/0:19:3146 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b21d9000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:21:3151 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:21    state:D stack:0     pid:3151  tgid:3151  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa95d84 r8:00000002 r7:60000013 r6:dfa95d8c r5:841ae000
 r4:841ae000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:841ae000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa95e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84952440
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:841ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa55000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8535e78c r4:8535e400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8535e78c r4:847e2f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:841ae000 r8:847e2fac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847e2f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847e2f80 r8:80287e08 r7:dfa8de60 r6:84795d00 r5:841ae000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa95fb0 to 0xdfa95ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84b3a340
INFO: task kworker/0:21:3151 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b29da000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:43:3447 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:43    state:D stack:0     pid:3447  tgid:3447  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dff21d84 r8:00000002 r7:60000113 r6:dff21d8c r5:84b41800
 r4:84b41800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b41800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff21e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc000
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84b41800 r7:00000000 r6:83018000 r5:00001000 r4:7f093000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe13000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:844b638c r4:844b6000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:844b638c r4:84944180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b41800 r8:849441ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84944180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84944180 r8:80287e08 r7:dfb39e60 r6:84944200 r5:84b41800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff21fb0 to 0xdff21ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84951940
INFO: task kworker/0:43:3447 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b29da000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:45:3450 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:45    state:D stack:0     pid:3450  tgid:3450  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfdbdd84 r8:00000002 r7:60000113 r6:dfdbdd8c r5:84b43c00
 r4:84b43c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b43c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdbde08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae2040
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84b43c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd5f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84affb8c r4:84aff800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84affb8c r4:84944380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b43c00 r8:849443ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84944380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84944380 r8:80287e08 r7:dff21e60 r6:84944400 r5:84b43c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfdbdfb0 to 0xdfdbdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84951b80
INFO: task kworker/0:45:3450 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b2a82000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:138:3472 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:138   state:D stack:0     pid:3472  tgid:3472  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dff95d84 r8:00000002 r7:60000113 r6:dff95d8c r5:848e4800
 r4:848e4800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:848e4800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff95e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6000
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd1b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84954f8c r4:84954c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84954f8c r4:8483ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e4800 r8:8483ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac00 r8:80287e08 r7:dff71e60 r6:84944980 r5:848e4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff95fb0 to 0xdff95ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839940
INFO: task kworker/1:138:3472 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b2f3c000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:139:3474 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:139   state:D stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dff9dd84 r8:00000002 r7:60000013 r6:dff9dd8c r5:848e3c00
 r4:848e3c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:848e3c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff9de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
INFO: task kworker/1:139:3474 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b323b000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:140:3476 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:140   state:D stack:0     pid:3476  tgid:3476  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dffa5d84 r8:00000002 r7:60000113 r6:dffa5d8c r5:848e6000
 r4:848e6000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:848e6000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffa5e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839bc0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb33000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553f8c r4:84553c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553f8c r4:8483ad00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e6000 r8:8483ad2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ad00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ad00 r8:80287e08 r7:dff95e60 r6:84944a80 r5:848e6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffa5fb0 to 0xdffa5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839e80
INFO: task kworker/1:140:3476 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b34d6000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:141:3478 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:141   state:D stack:0     pid:3478  tgid:3478  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dffadd84 r8:00000002 r7:60000113 r6:dffadd8c r5:848e6c00
 r4:848e6c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:848e6c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffade08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84951500
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb3f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8495438c r4:84954000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8495438c r4:8483ad80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e6c00 r8:8483adac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ad80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ad80 r8:80287e08 r7:dff95e60 r6:84944b00 r5:848e6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffadfb0 to 0xdffadff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839d00
INFO: task kworker/1:141:3478 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b34d6000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:142:3480 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:142   state:D stack:0     pid:3480  tgid:3480  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dffb5d84 r8:00000002 r7:60000113 r6:dffb5d8c r5:848e0000
 r4:848e0000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:848e0000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffb5e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839d00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfcaf000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8495478c r4:84954400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8495478c r4:8483ae00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0000 r8:8483ae2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ae00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ae00 r8:80287e08 r7:dff95e60 r6:84944b80 r5:848e0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffb5fb0 to 0xdffb5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84951580
INFO: task kworker/1:142:3480 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b392d000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:143:3482 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:143   state:D stack:0     pid:3482  tgid:3482  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dffbdd84 r8:00000002 r7:60000013 r6:dffbdd8c r5:84b50c00
 r4:84b50c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b50c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffbde08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8483bac0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b50c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfcdd000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84954b8c r4:84954800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84954b8c r4:8483ae80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b50c00 r8:8483aeac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ae80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ae80 r8:80287e08 r7:dff95e60 r6:84944c00 r5:84b50c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffbdfb0 to 0xdffbdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839ec0
INFO: task kworker/1:143:3482 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b3de2000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:144:3485 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:144   state:D stack:0     pid:3485  tgid:3485  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dffc5d84 r8:00000002 r7:60000113 r6:dffc5d8c r5:84b52400
 r4:84b52400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b52400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffc5e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6300
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b52400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd3d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8495578c r4:84955400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8495578c r4:8483af00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b52400 r8:8483af2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483af00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483af00 r8:80287e08 r7:dff95e60 r6:84944c80 r5:84b52400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffc5fb0 to 0xdffc5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84bf6100
INFO: task kworker/1:144:3485 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b3de2000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:145:3486 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:145   state:D stack:0     pid:3486  tgid:3486  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dffc9d84 r8:00000002 r7:60000113 r6:dffc9d8c r5:84b53000
 r4:84b53000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b53000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffc9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6200
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b53000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd2b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8495538c r4:84955000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8495538c r4:8483af80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b53000 r8:8483afac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483af80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483af80 r8:80287e08 r7:dffc5e60 r6:84944d00 r5:84b53000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffc9fb0 to 0xdffc9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84bf6100
INFO: task kworker/1:145:3486 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b4659000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:146:3488 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:146   state:D stack:0     pid:3488  tgid:3488  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dffd1d84 r8:00000002 r7:60000113 r6:dffd1d8c r5:84b54800
 r4:84b54800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b54800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffd1e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6480
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b54800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd45000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84955b8c r4:84955800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84955b8c r4:84bf7000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b54800 r8:84bf702c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84bf7000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf7000 r8:80287e08 r7:dffc5e60 r6:84944d80 r5:84b54800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd1fb0 to 0xdffd1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84bf61c0
INFO: task kworker/1:146:3488 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b4889000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:147:3490 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:147   state:D stack:0     pid:3490  tgid:3490  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dffd9d84 r8:00000002 r7:60000113 r6:dffd9d8c r5:84b53c00
 r4:84b53c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b53c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffd9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6580
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b53c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd53000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84955f8c r4:84955c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84955f8c r4:84bf7080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b53c00 r8:84bf70ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84bf7080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf7080 r8:80287e08 r7:dffd1e60 r6:84944e00 r5:84b53c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd9fb0 to 0xdffd9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84bf6280
INFO: task kworker/1:147:3490 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b4c07000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:148:3492 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:148   state:D stack:0     pid:3492  tgid:3492  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dffe1d84 r8:00000002 r7:60000013 r6:dffe1d8c r5:84b56000
 r4:84b56000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b56000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffe1e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6780
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b56000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd71000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8495678c r4:84956400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8495678c r4:84bf7100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b56000 r8:84bf712c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84bf7100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf7100 r8:80287e08 r7:dffd9e60 r6:84944e80 r5:84b56000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84bf63c0
INFO: task kworker/1:148:3492 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b4f66000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:149:3496 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:149   state:D stack:0     pid:3496  tgid:3496  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dffb9d84 r8:00000002 r7:60000113 r6:dffb9d8c r5:84b51800
 r4:84b51800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b51800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffb9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6980
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b51800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd8f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84956f8c r4:84956c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84956f8c r4:84bf7580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b51800 r8:84bf75ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84bf7580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf7580 r8:80287e08 r7:dffe1e60 r6:84944f00 r5:84b51800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffb9fb0 to 0xdffb9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84bf6740
INFO: task kworker/1:149:3496 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b5286000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:46:3497 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:46    state:D stack:0     pid:3497  tgid:3497  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dffe5d84 r8:00000002 r7:60000113 r6:dffe5d8c r5:84b56c00
 r4:84b56c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b56c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffe5e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c3040
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84b56c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc43000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8437bb8c r4:8437b800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8437bb8c r4:84944f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b56c00 r8:84944fac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84944f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84944f80 r8:80287e08 r7:dff21e60 r6:848c4000 r5:84b56c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe5fb0 to 0xdffe5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84ae2e80
INFO: task kworker/0:46:3497 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b5286000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:150:3499 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:150   state:D stack:0     pid:3499  tgid:3499  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dffedd84 r8:00000002 r7:60000013 r6:dffedd8c r5:84b50000
 r4:84b50000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b50000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffede08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6880
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b50000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd7d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84956b8c r4:84956800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84956b8c r4:84bf7600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b50000 r8:84bf762c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84bf7600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf7600 r8:80287e08 r7:dffb9e60 r6:848c4080 r5:84b50000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffedfb0 to 0xdffedff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84bf6800
INFO: task kworker/1:150:3499 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b5898000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:151:3501 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:151   state:D stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfff5d84 r8:00000002 r7:60000113 r6:dfff5d8c r5:84b55400
 r4:84b55400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b55400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfff5e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cbbc0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b55400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbcf000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8437a78c r4:8437a400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8437a78c r4:84bf7680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b55400 r8:84bf76ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84bf7680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf7680 r8:80287e08 r7:dffb9e60 r6:848c4100 r5:84b55400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfff5fb0 to 0xdfff5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84bf6c00
INFO: task kworker/1:151:3501 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b5c23000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:152:3502 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:152   state:D stack:0     pid:3502  tgid:3502  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfff9d84 r8:00000002 r7:60000113 r6:dfff9d8c r5:84ba8000
 r4:84ba8000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ba8000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfff9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6a40
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ba8000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd9b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8495738c r4:84957000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8495738c r4:84bf7700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ba8000 r8:84bf772c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84bf7700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf7700 r8:80287e08 r7:dfff5e60 r6:848c4180 r5:84ba8000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfff9fb0 to 0xdfff9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84bf6c00
INFO: task kworker/1:152:3502 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b5c23000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:153:3504 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:153   state:D stack:0     pid:3504  tgid:3504  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0001d84 r8:00000002 r7:60000013 r6:e0001d8c r5:84ba9800
 r4:84ba9800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ba9800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0001e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6c40
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ba9800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfdc3000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8495778c r4:84957400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8495778c r4:84bf7780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ba9800 r8:84bf77ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84bf7780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf7780 r8:80287e08 r7:dfff5e60 r6:848c4200 r5:84ba9800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0001fb0 to 0xe0001ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84bf6a80
INFO: task kworker/1:153:3504 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b631a000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:154:3506 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:154   state:D stack:0     pid:3506  tgid:3506  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0009d84 r8:00000002 r7:60000113 r6:e0009d8c r5:84ba8c00
 r4:84ba8c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ba8c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0009e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6d00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ba8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfdcf000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84957b8c r4:84957800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84957b8c r4:84bf7880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ba8c00 r8:84bf78ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84bf7880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf7880 r8:80287e08 r7:dfff5e60 r6:848c4280 r5:84ba8c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0009fb0 to 0xe0009ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84bf6b80
INFO: task kworker/1:154:3506 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b689b000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:155:3508 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:155   state:D stack:0     pid:3508  tgid:3508  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0011d84 r8:00000002 r7:60000113 r6:e0011d8c r5:84baa400
 r4:84baa400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84baa400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0011e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6e40
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84baa400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfde9000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84957f8c r4:84957c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84957f8c r4:84bf7800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84baa400 r8:84bf782c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84bf7800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf7800 r8:80287e08 r7:dfff5e60 r6:848c4300 r5:84baa400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0011fb0 to 0xe0011ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84bf6d40
INFO: task kworker/1:155:3508 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b6c53000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:156:3510 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:156   state:D stack:0     pid:3510  tgid:3510  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0019d84 r8:00000002 r7:60000113 r6:e0019d8c r5:84bab000
 r4:84bab000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84bab000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0019e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6600
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84bab000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfdf1000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8495638c r4:84956000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8495638c r4:84bf7900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84bab000 r8:84bf792c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84bf7900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf7900 r8:80287e08 r7:dfff5e60 r6:848c4380 r5:84bab000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0019fb0 to 0xe0019ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8483bd00
INFO: task kworker/1:156:3510 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b71f4000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:157:3512 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:157   state:D stack:0     pid:3512  tgid:3512  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfe39d84 r8:00000002 r7:60000113 r6:dfe39d8c r5:84babc00
 r4:84babc00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84babc00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe39e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cb040
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84babc00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df877000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8437838c r4:84378000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8437838c r4:84bf7980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84babc00 r8:84bf79ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84bf7980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf7980 r8:80287e08 r7:dfff5e60 r6:848c4400 r5:84babc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe39fb0 to 0xdfe39ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:848cb0c0
INFO: task kworker/1:157:3512 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b71f4000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:158:3514 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:158   state:D stack:0     pid:3514  tgid:3514  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfe49d84 r8:00000002 r7:60000113 r6:dfe49d8c r5:84bac800
 r4:84bac800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84bac800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe49e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cb180
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84bac800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df96f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8437878c r4:84378400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8437878c r4:84bf7a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84bac800 r8:84bf7a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84bf7a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf7a00 r8:80287e08 r7:dfff5e60 r6:848c4480 r5:84bac800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe49fb0 to 0xdfe49ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:848cb200
INFO: task kworker/1:158:3514 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b71f4000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:159:3516 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:159   state:D stack:0     pid:3516  tgid:3516  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfe5dd84 r8:00000002 r7:60000013 r6:dfe5dd8c r5:84bad400
 r4:84bad400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84bad400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe5de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cb300
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84bad400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9ab000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84378b8c r4:84378800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84378b8c r4:84bf7a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84bad400 r8:84bf7aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84bf7a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf7a80 r8:80287e08 r7:dfff5e60 r6:848c4500 r5:84bad400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe5dfb0 to 0xdfe5dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:848cb380
INFO: task kworker/1:159:3516 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b71f4000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:160:3518 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:160   state:D stack:0     pid:3518  tgid:3518  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfe89d84 r8:00000002 r7:60000013 r6:dfe89d8c r5:84bae000
 r4:84bae000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84bae000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe89e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cb440
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84bae000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9c3000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84378f8c r4:84378c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84378f8c r4:84bf7b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84bae000 r8:84bf7b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84bf7b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf7b00 r8:80287e08 r7:dfff5e60 r6:848c4580 r5:84bae000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe89fb0 to 0xdfe89ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:848cb240
INFO: task kworker/1:160:3518 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b7c21000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:161:3520 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:161   state:D stack:0     pid:3520  tgid:3520  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfeb9d84 r8:00000002 r7:60000013 r6:dfeb9d8c r5:84baec00
 r4:84baec00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84baec00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfeb9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cb500
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84baec00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb63000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8437938c r4:84379000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8437938c r4:84bf7b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84baec00 r8:84bf7bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84bf7b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf7b80 r8:80287e08 r7:dfff5e60 r6:848c4600 r5:84baec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfeb9fb0 to 0xdfeb9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:848cb140
INFO: task kworker/1:161:3520 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b7d8f000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:162:3522 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:162   state:D stack:0     pid:3522  tgid:3522  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0021d84 r8:00000002 r7:60000113 r6:e0021d8c r5:84ad0c00
 r4:84ad0c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ad0c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0021e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cb640
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ad0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb77000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8437978c r4:84379400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8437978c r4:84bf7c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ad0c00 r8:84bf7c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84bf7c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf7c00 r8:80287e08 r7:dfff5e60 r6:848c4680 r5:84ad0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0021fb0 to 0xe0021ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:848cb540
INFO: task kworker/1:162:3522 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b7f0d000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:163:3524 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:163   state:D stack:0     pid:3524  tgid:3524  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0029d84 r8:00000002 r7:60000113 r6:e0029d8c r5:84ad0000
 r4:84ad0000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ad0000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0029e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cb780
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ad0000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb8d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84379b8c r4:84379800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84379b8c r4:84bf7c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ad0000 r8:84bf7cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84bf7c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf7c80 r8:80287e08 r7:dfff5e60 r6:848c4700 r5:84ad0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0029fb0 to 0xe0029ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:848cb680
INFO: task kworker/1:163:3524 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b8200000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:164:3526 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:164   state:D stack:0     pid:3526  tgid:3526  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dffddd84 r8:00000002 r7:60000113 r6:dffddd8c r5:84bbe000
 r4:84bbe000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84bbe000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffdde08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cbac0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84bbe000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbb9000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8437a38c r4:8437a000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8437a38c r4:84bf7d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84bbe000 r8:84bf7d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84bf7d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf7d00 r8:80287e08 r7:dfff5e60 r6:84bf7d80 r5:84bbe000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffddfb0 to 0xdffddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:848cb980
INFO: task kworker/1:164:3526 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b8531000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:165:3530 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:165   state:D stack:0     pid:3530  tgid:3530  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e002dd84 r8:00000002 r7:60000013 r6:e002dd8c r5:84bbec00
 r4:84bbec00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84bbec00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e002de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433c2c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84bbec00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc2d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8437b78c r4:8437b400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8437b78c r4:84bf7e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84bbec00 r8:84bf7e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84bf7e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf7e00 r8:80287e08 r7:dfff5e60 r6:84bf7e80 r5:84bbec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe002dfb0 to 0xe002dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:848cbb40
INFO: task kworker/1:165:3530 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b87b9000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:166:3531 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:166   state:D stack:0     pid:3531  tgid:3531  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfdd9d84 r8:00000002 r7:60000113 r6:dfdd9d8c r5:84bbd400
 r4:84bbd400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84bbd400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdd9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cbe00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84bbd400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbe5000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8437ab8c r4:8437a800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8437ab8c r4:84bf7f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84bbd400 r8:84bf7f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84bf7f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf7f00 r8:80287e08 r7:e002de60 r6:84bf7f80 r5:84bbd400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfdd9fb0 to 0xdfdd9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:848cbb40
INFO: task kworker/1:166:3531 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b8a53000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:167:3534 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:167   state:D stack:0     pid:3534  tgid:3534  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0039d84 r8:00000002 r7:60000013 r6:e0039d8c r5:84bba400
 r4:84bba400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84bba400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0039e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cbec0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84bba400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbfd000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8437af8c r4:8437ac00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8437af8c r4:84bf7500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84bba400 r8:84bf752c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84bf7500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf7500 r8:80287e08 r7:e002de60 r6:84bf7180 r5:84bba400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0039fb0 to 0xe0039ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:848cbf00
INFO: task kworker/1:167:3534 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b8cfa000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:168:3536 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:168   state:D stack:0     pid:3536  tgid:3536  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e003dd84 r8:00000002 r7:60000013 r6:e003dd8c r5:84bb6c00
 r4:84bb6c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84bb6c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e003de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433c040
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84bb6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc19000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8437b38c r4:8437b000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8437b38c r4:84bf7200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84bb6c00 r8:84bf722c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84bf7200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf7200 r8:80287e08 r7:e002de60 r6:84bf7280 r5:84bb6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe003dfb0 to 0xe003dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8433c100
INFO: task kworker/1:168:3536 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b9356000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:169:3538 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:169   state:D stack:0     pid:3538  tgid:3538  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0041d84 r8:00000002 r7:60000013 r6:e0041d8c r5:84bbbc00
 r4:84bbbc00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84bbbc00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0041e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433c540
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84bbbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc57000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8437bf8c r4:8437bc00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8437bf8c r4:84bf7300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84bbbc00 r8:84bf732c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84bf7300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf7300 r8:80287e08 r7:e002de60 r6:84bf7380 r5:84bbbc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0041fb0 to 0xe0041ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8433c280
INFO: task kworker/1:169:3538 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b9356000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:47:3540 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:47    state:D stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0045d84 r8:00000002 r7:60000113 r6:e0045d8c r5:84ad3000
 r4:84ad3000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ad3000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0045e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84936d00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ad3000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbc9000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8439438c r4:84394000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8439438c r4:848c4780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ad3000 r8:848c47ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:848c4780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:848c4780 r8:80287e08 r7:dff21e60 r6:848c4800 r5:84ad3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0045fb0 to 0xe0045ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:848c33c0
INFO: task kworker/0:47:3540 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b9bc2000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:170:3542 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:170   state:D stack:0     pid:3542  tgid:3542  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e004dd84 r8:00000002 r7:60000113 r6:e004dd8c r5:84ad4800
 r4:84ad4800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ad4800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e004de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433c740
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ad4800 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc83000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84afff8c r4:84affc00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84afff8c r4:84bf7400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ad4800 r8:84bf742c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84bf7400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf7400 r8:80287e08 r7:e0041e60 r6:848c4880 r5:84ad4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe004dfb0 to 0xe004dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8433c500
INFO: task kworker/1:170:3542 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   b9bc2000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:171:3543 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:171   state:D stack:0     pid:3543  tgid:3543  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0051d84 r8:00000002 r7:60000113 r6:e0051d8c r5:84ad2400
 r4:84ad2400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ad2400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0051e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433c600
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ad2400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc6f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8495838c r4:84958000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8495838c r4:84bf7480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ad2400 r8:84bf74ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84bf7480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf7480 r8:80287e08 r7:e004de60 r6:848c4900 r5:84ad2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0051fb0 to 0xe0051ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8433c700
INFO: task kworker/1:171:3543 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   ba417000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:172:3546 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:172   state:D stack:0     pid:3546  tgid:3546  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0055d84 r8:00000002 r7:60000113 r6:e0055d8c r5:84ad3c00
 r4:84ad3c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ad3c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0055e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433c940
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ad3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc9f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8495878c r4:84958400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8495878c r4:843b0000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ad3c00 r8:843b002c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:843b0000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:843b0000 r8:80287e08 r7:e004de60 r6:848c4980 r5:84ad3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0055fb0 to 0xe0055ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8433c840
INFO: task kworker/1:172:3546 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   ba57f000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:173:3548 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:173   state:D stack:0     pid:3548  tgid:3548  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0059d84 r8:00000002 r7:60000113 r6:e0059d8c r5:84ad5400
 r4:84ad5400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ad5400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0059e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433ca00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ad5400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfcbb000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84958b8c r4:84958800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84958b8c r4:843b0080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ad5400 r8:843b00ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:843b0080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:843b0080 r8:80287e08 r7:e0055e60 r6:848c4a00 r5:84ad5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0059fb0 to 0xe0059ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8433c900
INFO: task kworker/1:173:3548 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   ba911000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:174:3550 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:174   state:D stack:0     pid:3550  tgid:3550  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e005dd84 r8:00000002 r7:60000113 r6:e005dd8c r5:84ad6000
 r4:84ad6000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ad6000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e005de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433cc40
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ad6000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe1f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84958f8c r4:84958c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84958f8c r4:843b0100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ad6000 r8:843b012c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:843b0100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:843b0100 r8:80287e08 r7:e0059e60 r6:848c4a80 r5:84ad6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe005dfb0 to 0xe005dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8433c900
INFO: task kworker/1:174:3550 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   ba911000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:48:3553 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:48    state:D stack:0     pid:3553  tgid:3553  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0061d84 r8:00000002 r7:60000113 r6:e0061d8c r5:84ad1800
 r4:84ad1800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ad1800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0061e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490b740
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ad1800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd4b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:844b4f8c r4:844b4c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:844b4f8c r4:848c4b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ad1800 r8:848c4b2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:848c4b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:848c4b00 r8:80287e08 r7:e0045e60 r6:848c4b80 r5:84ad1800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0061fb0 to 0xe0061ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847dc100
INFO: task kworker/0:48:3553 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   baeb1000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:175:3554 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:175   state:D stack:0     pid:3554  tgid:3554  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0065d84 r8:00000002 r7:60000013 r6:e0065d8c r5:84bb4800
 r4:84bb4800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84bb4800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0065e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433cd40
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84bb4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe4b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8495938c r4:84959000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8495938c r4:843b0180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84bb4800 r8:843b01ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:843b0180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:843b0180 r8:80287e08 r7:e005de60 r6:848c4c00 r5:84bb4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0065fb0 to 0xe0065ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8433cc00
INFO: task kworker/1:175:3554 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   baeb1000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:176:3556 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:176   state:D stack:0     pid:3556  tgid:3556  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e006dd84 r8:00000002 r7:60000113 r6:e006dd8c r5:84ad6c00
 r4:84ad6c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ad6c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e006de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b871c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ad6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfec1000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8495a78c r4:8495a400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8495a78c r4:843b0200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ad6c00 r8:843b022c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:843b0200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:843b0200 r8:80287e08 r7:e0065e60 r6:848c4c80 r5:84ad6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe006dfb0 to 0xe006dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8433ccc0
INFO: task kworker/1:176:3556 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   baeb1000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:177:3558 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:177   state:D stack:0     pid:3558  tgid:3558  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0075d84 r8:00000002 r7:60000013 r6:e0075d8c r5:84a88c00
 r4:84a88c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84a88c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0075e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433cec0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84a88c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe65000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8495978c r4:84959400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8495978c r4:843b0280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84a88c00 r8:843b02ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:843b0280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:843b0280 r8:80287e08 r7:e006de60 r6:848c4d00 r5:84a88c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0075fb0 to 0xe0075ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:848cbf40
INFO: task kworker/1:177:3558 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   bba4e000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:178:3559 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:178   state:D stack:0     pid:3559  tgid:3559  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0079d84 r8:00000002 r7:60000113 r6:e0079d8c r5:84a89800
 r4:84a89800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84a89800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0079e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cbb40
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84a89800 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe7f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84959b8c r4:84959800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84959b8c r4:843b0300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84a89800 r8:843b032c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:843b0300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:843b0300 r8:80287e08 r7:e006de60 r6:848c4d80 r5:84a89800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0079fb0 to 0xe0079ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:848cbf40
INFO: task kworker/1:178:3559 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   bba4e000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:179:3561 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:179   state:D stack:0     pid:3561  tgid:3561  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0081d84 r8:00000002 r7:60000113 r6:e0081d8c r5:84a88000
 r4:84a88000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84a88000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0081e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433cb80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84a88000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe99000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84959f8c r4:84959c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84959f8c r4:843b0380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84a88000 r8:843b03ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:843b0380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:843b0380 r8:80287e08 r7:e006de60 r6:848c4e00 r5:84a88000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0081fb0 to 0xe0081ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8433c0c0
INFO: task kworker/1:179:3561 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   bc0f3000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:180:3563 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:180   state:D stack:0     pid:3563  tgid:3563  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0049d84 r8:00000002 r7:60000113 r6:e0049d8c r5:84970000
 r4:84970000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84970000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0049e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87000
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84970000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeab000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8495a38c r4:8495a000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8495a38c r4:843b0400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84970000 r8:843b042c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:843b0400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:843b0400 r8:80287e08 r7:e006de60 r6:843b0480 r5:84970000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0049fb0 to 0xe0049ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:83b87140
INFO: task kworker/1:180:3563 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   bc0f3000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:181:3566 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:181   state:D stack:0     pid:3566  tgid:3566  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0085d84 r8:00000002 r7:60000013 r6:e0085d8c r5:84971800
 r4:84971800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84971800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0085e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87900
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84971800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff19000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8495bb8c r4:8495b800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8495bb8c r4:843b0500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84971800 r8:843b052c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:843b0500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:843b0500 r8:80287e08 r7:e006de60 r6:843b0580 r5:84971800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0085fb0 to 0xe0085ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:83b87180
INFO: task kworker/1:181:3566 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   bc5c9000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:182:3567 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:182   state:D stack:0     pid:3567  tgid:3567  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0035d84 r8:00000002 r7:60000113 r6:e0035d8c r5:84972400
 r4:84972400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84972400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0035e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84972400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfedd000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8495ab8c r4:8495a800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8495ab8c r4:843b0600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84972400 r8:843b062c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:843b0600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:843b0600 r8:80287e08 r7:e0085e60 r6:843b0680 r5:84972400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0035fb0 to 0xe0035ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:83b87180
INFO: task kworker/1:182:3567 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   bc797000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:183:3569 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:183   state:D stack:0     pid:3569  tgid:3569  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e008dd84 r8:00000002 r7:60000113 r6:e008dd8c r5:84973000
 r4:84973000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84973000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e008de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87580
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84973000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfee9000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8495af8c r4:8495ac00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8495af8c r4:843b0700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84973000 r8:843b072c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:843b0700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:843b0700 r8:80287e08 r7:e0085e60 r6:843b0780 r5:84973000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe008dfb0 to 0xe008dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:83b87480
INFO: task kworker/1:183:3569 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   bc797000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:184:3573 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:184   state:D stack:0     pid:3573  tgid:3573  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0091d84 r8:00000002 r7:60000013 r6:e0091d8c r5:84973c00
 r4:84973c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84973c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0091e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87680
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84973c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfefb000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8495b38c r4:8495b000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8495b38c r4:843b0800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84973c00 r8:843b082c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:843b0800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:843b0800 r8:80287e08 r7:e0085e60 r6:843b0880 r5:84973c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0091fb0 to 0xe0091ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:83b87600
INFO: task kworker/1:184:3573 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   bcc8b000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:185:3574 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:185   state:D stack:0     pid:3574  tgid:3574  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0099d84 r8:00000002 r7:60000013 r6:e0099d8c r5:84974800
 r4:84974800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84974800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0099e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87780
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84974800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8495b78c r4:8495b400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8495b78c r4:843b0900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84974800 r8:843b092c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:843b0900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:843b0900 r8:80287e08 r7:e0085e60 r6:843b0980 r5:84974800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0099fb0 to 0xe0099ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:83b87700
INFO: task kworker/1:185:3574 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   bccc3000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:186:3576 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:186   state:D stack:0     pid:3576  tgid:3576  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e00a1d84 r8:00000002 r7:60000113 r6:e00a1d8c r5:84975400
 r4:84975400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84975400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00a1e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87c40
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84975400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff37000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8495c38c r4:8495c000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8495c38c r4:843b0a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84975400 r8:843b0a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:843b0a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:843b0a00 r8:80287e08 r7:e0085e60 r6:843b0a80 r5:84975400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00a1fb0 to 0xe00a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:83b87840
INFO: task kworker/1:186:3576 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   bccc3000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:187:3578 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:187   state:D stack:0     pid:3578  tgid:3578  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0095d84 r8:00000002 r7:60000113 r6:e0095d8c r5:84976000
 r4:84976000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84976000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0095e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84976000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff25000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8495bf8c r4:8495bc00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8495bf8c r4:843b0b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84976000 r8:843b0b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:843b0b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:843b0b00 r8:80287e08 r7:e00a1e60 r6:843b0b80 r5:84976000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0095fb0 to 0xe0095ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:83b87840
INFO: task kworker/1:187:3578 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   bd2db000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:188:3580 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:188   state:D stack:0     pid:3580  tgid:3580  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e00a5d84 r8:00000002 r7:60000013 r6:e00a5d8c r5:84976c00
 r4:84976c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84976c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00a5e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87dc0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84976c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff43000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8495c78c r4:8495c400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8495c78c r4:843b0c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84976c00 r8:843b0c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:843b0c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:843b0c00 r8:80287e08 r7:e00a1e60 r6:843b0c80 r5:84976c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00a5fb0 to 0xe00a5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:83b87b40
INFO: task kworker/1:188:3580 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   bd2db000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:189:3582 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:189   state:D stack:0     pid:3582  tgid:3582  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e00a9d84 r8:00000002 r7:60000013 r6:e00a9d8c r5:84970c00
 r4:84970c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84970c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00a9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8438c040
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84970c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e00af000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8495cb8c r4:8495c800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8495cb8c r4:843b0d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84970c00 r8:843b0d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:843b0d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:843b0d00 r8:80287e08 r7:e00a5e60 r6:843b0d80 r5:84970c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00a9fb0 to 0xe00a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:83b87d40
INFO: task kworker/1:189:3582 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   bde2e000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08
 r4:dff71dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb07000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8455378c r4:84553400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:190:3584 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:190   state:D stack:0     pid:3584  tgid:3584  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e00add84 r8:00000002 r7:60000113 r6:e00add8c r5:84bbc800
 r4:84bbc800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84bbc800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00ade08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8438c840
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84bbc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e00db000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8495db8c r4:8495d800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8495db8c r4:843b0e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84bbc800 r8:843b0e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:843b0e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:843b0e00 r8:80287e08 r7:e00a9e60 r6:843b0e80 r5:84bbc800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00adfb0 to 0xe00adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8438c280
INFO: task kworker/1:190:3584 is blocked on a mutex likely owned by task kworker/1:133:3463.
task:kworker/1:133   state:R  running task     stack:0     pid:3463  tgid:3463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff71d28 to 0xdff71d70)
1d20:                   bde2e000 dfae3000 00000001 80239b98 7f14f000 00000001
1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78
1d60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unm

<<cut 6355896 bytes out>>

jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:700:4850 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:700   state:D stack:0     pid:4850  tgid:4850  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb35dd84 r8:00000002 r7:60000113 r6:eb35dd8c r5:85343000
 r4:85343000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85343000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb35de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85397b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85343000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb029000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853af78c r4:853af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853af78c r4:85387b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85343000 r8:85387b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85387b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85387b00 r8:80287e08 r7:eb34de60 r6:85387b80 r5:85343000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb35dfb0 to 0xeb35dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
dd20:                   b474a000 dfafb000 00000001 80239b98 7f151000 00000001
 r4:dff9ddc0
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
INFO: task kworker/1:701:4853 blocked for more than 465 seconds.
 r10:8291a684 r9:eb359d84 r8:00000002 r7:60000113 r6:eb359d8c r5:85343c00
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:85343c00 r8:85387c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85387c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85387c00 r8:80287e08 r7:eb34de60 r6:85387c80 r5:85343c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb359fb0 to 0xeb359ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85397b80
INFO: task kworker/1:701:4853 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   b4bfd000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:8291a684 r9:eb361d84 r8:00000002 r7:60000113 r6:eb361d8c r5:85344800
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:85344800 r8:85387d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:82ac21e4
 r4:00000000
 r5:84553b8c r4:84553800
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
INFO: task kworker/1:703:4856 blocked for more than 465 seconds.
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r5:00001000 r4:eb099000
 r5:853f038c r4:853f0000
 r4:85387e00
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:82ac21e4
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:704:4858 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:704   state:D stack:0     pid:4858  tgid:4858  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb369d84 r8:00000002 r7:60000013 r6:eb369d8c r5:85345400
 r4:85345400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85345400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb369e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539e140
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85345400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb14f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853f078c r4:853f0400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853f078c r4:85387f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85345400 r8:85387f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85387f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85387f00 r8:80287e08 r7:eb361e60 r6:85387f80 r5:85345400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb369fb0 to 0xeb369ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8539e100
INFO: task kworker/1:704:4858 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   b4f2e000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:00000000
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r4:00000000
 r4:00000000
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r7:ddde2d80 r6:83018200 r5:853f0b8c r4:853a2000
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8535db8c r4:8535d800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8535db8c r4:8538b300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85320000 r8:8538b32c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8538b300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8538b300 r8:80287e08 r7:eb1b9e60 r6:853a2100 r5:85320000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb375fb0 to 0xeb375ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8539d680
INFO: task kworker/0:164:4861 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   b526b000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r5:853f178c r4:853f1400
 r4:853a2180
Exception stack(0xeb379fb0 to 0xeb379ff8)
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:8483ac80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
      Not tainted 6.15.0-rc6-syzkaller #0
task:kworker/1:707   state:D stack:0     pid:4865  tgid:4865  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb37dd84 r8:00000002 r7:60000013 r6:eb37dd8c r5:85331800
 r4:85331800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85331800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb37de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539e980
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85331800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb1c1000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853f138c r4:853f1000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853f138c r4:853a2280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85331800 r8:853a22ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:853a2280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a2280 r8:80287e08 r7:eb379e60 r6:853a2300 r5:85331800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb37dfb0 to 0xeb37dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8539e580
INFO: task kworker/1:707:4865 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   b5acc000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
 r4:dff9ddc0
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:84839bc0
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r5:00001000 r4:e072b000
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   b5acc000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:708:4870 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:708   state:D stack:0     pid:4870  tgid:4870  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:853c6000 r4:8291a680
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:8539ea00
Call trace: 
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   b5acc000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:709:4872 blocked for more than 465 seconds.
 r5:853c3000 r4:8291a680
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r7:ddde2d80 r6:83018200 r5:853f1f8c r4:853a2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb391fb0 to 0xeb391ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8539eb80
INFO: task kworker/1:709:4872 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   b62c7000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfa0:                                     00000000 00000000 00000000 00000000
task:kworker/1:710   state:D stack:0     pid:4874  tgid:4874  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539ee00
 r5:853f238c r4:853f2000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:853a2480 r8:80287e08 r7:eb391e60 r6:853a2500 r5:85332400
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   b62c7000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:8291a684 r9:eb399d84 r8:00000002 r7:60000113 r6:eb399d8c r5:85333000
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r7:ddde2d80 r6:83018200 r5:853f278c r4:853a2580
 r10:00000000 r9:853a2580 r8:80287e08 r7:eb381e60 r6:853a2600 r5:85333000
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853f2f8c r4:853f2c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853f2f8c r4:853a2680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85333c00 r8:853a26ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:853a2680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a2680 r8:80287e08 r7:eb399e60 r6:853a2700 r5:85333c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb39dfb0 to 0xeb39dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853a9100
INFO: task kworker/1:712:4879 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   b653b000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:713:4880 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
Workqueue: events bpf_prog_free_deferred
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb395e08
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:ddde2d80 r6:83018200 r5:853f2b8c r4:853a2780
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:715:4884 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:715   state:D stack:0     pid:4884  tgid:4884  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb3add84 r8:00000002 r7:60000013 r6:eb3add8c r5:85336000
 r4:85336000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85336000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ade08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9340
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85336000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb3af000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853f338c r4:853f3000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853f338c r4:853a2980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85336000 r8:853a29ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:853a2980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a2980 r8:80287e08 r7:eb3a1e60 r6:853a2a00 r5:85336000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3adfb0 to 0xeb3adff8)
dfa0:                                     00000000 00000000 00000000 00000000
 r4:853a9240
Call trace: 
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3bde08
 r4:00000000
 r5:853f3f8c r4:853f3c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
dfa0:                                     00000000 00000000 00000000 00000000
Call trace: 
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
INFO: task kworker/1:717:4887 blocked for more than 466 seconds.
 r4:85338c00
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c1e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a97c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85338c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa6b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853f3b8c r4:853f3800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853f3b8c r4:853a2b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85338c00 r8:853a2bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:853a2b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a2b80 r8:80287e08 r7:eb3bde60 r6:853a2c00 r5:85338c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3c1fb0 to 0xeb3c1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853a9780
INFO: task kworker/1:717:4887 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Call trace: 
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb3b9d84 r8:00000002 r7:60000013 r6:eb3b9d8c r5:85339800
 r4:85339800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85339800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539eec0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85339800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e492b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8540078c r4:85400400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8540078c r4:853a2c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85339800 r8:853a2cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:853a2c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a2c80 r8:80287e08 r7:eb3bde60 r6:853a2d00 r5:85339800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3b9fb0 to 0xeb3b9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853a9980
INFO: task kworker/1:718:4890 is blocked on a mutex likely owned by task kworker/1:139:3474.
 r4:00000000
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r4:dff9ddc0
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
task:kworker/1:719   state:D stack:0     pid:4892  tgid:4892  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb3cdd84 r8:00000002 r7:60000113 r6:eb3cdd8c r5:8533b000
 r4:8533b000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8533b000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3cde08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9e00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8533b000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0803000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8540038c r4:85400000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8540038c r4:853a2d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8533b000 r8:853a2dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:853a2d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a2d80 r8:80287e08 r7:eb3b9e60 r6:853a2e00 r5:8533b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3cdfb0 to 0xeb3cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853a9b80
INFO: task kworker/1:719:4892 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   b7965000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r9:83018205 r8:8533c800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
 r5:8540178c r4:85401400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
5fa0:                                     00000000 00000000 00000000 00000000
Call trace: 
Exception stack(0xdff9dd28 to 0xdff9dd70)
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cc200
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eacd5000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85400f8c r4:85400c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85400f8c r4:853a2f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853c2400 r8:853a2fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:853a2f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a2f80 r8:80287e08 r7:eb3d5e60 r6:8538b580 r5:853c2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3c5fb0 to 0xeb3c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853a9b40
INFO: task kworker/1:721:4897 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   b8078000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:8483ac80
Exception stack(0xdff9dfb0 to 0xdff9dff8)
INFO: task kworker/0:166:4898 blocked for more than 466 seconds.
 r5:853c4800 r4:8291a680
 r4:00000000
 r4:00000000
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:8538b600
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r4:dff9ddc0
 r5:00001000 r4:dfb17000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
dfa0:                                     00000000 00000000 00000000 00000000
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   b84a7000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:167:4902 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:167   state:D stack:0     pid:4902  tgid:4902  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb3e1d84 r8:00000002 r7:60000113 r6:eb3e1d8c r5:85420000
 r4:85420000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85420000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
 r4:00000000
 r5:85402f8c r4:85402c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:8538b780
1fa0:                                     00000000 00000000 00000000 00000000
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
INFO: task kworker/1:723:4904 blocked for more than 466 seconds.
 r4:85421800
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e9e08
 r9:83018205 r8:85421800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
 r7:ddde2d80 r6:83018200 r5:8540338c r4:853a4080
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3e9fb0 to 0xeb3e9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:850cc480
INFO: task kworker/1:723:4904 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   b8ea4000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:724:4906 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:724   state:D stack:0     pid:4906  tgid:4906  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r4:85420c00
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f1e08
 r5:00001000 r4:eae31000
 r5:85401b8c r4:85401800
 r7:ddde2d80 r6:83018200 r5:85401b8c r4:853a4100
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
INFO: task kworker/1:725:4908 blocked for more than 466 seconds.
 r4:85423c00
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f9e08
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:8483ac80
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85423000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb401e08
 r5:00001000 r4:eae8f000
 r5:8540238c r4:85402000
 r4:853a4200
1fa0:                                     00000000 00000000 00000000 00000000
Call trace: 
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:727:4911 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:727   state:D stack:0     pid:4911  tgid:4911  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb405d84 r8:00000002 r7:60000113 r6:eb405d8c r5:85424800
 r4:85424800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85424800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb405e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cc9c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85424800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaeb5000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8540278c r4:85402400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8540278c r4:853a4280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85424800 r8:853a42ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:853a4280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a4280 r8:80287e08 r7:eb3e9e60 r6:8538ba80 r5:85424800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb405fb0 to 0xeb405ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:728:4914 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:728   state:D stack:0     pid:4914  tgid:4914  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r5:85425400 r4:8291a680
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:85402b8c r4:85402800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:853a4300
9fa0:                                     00000000 00000000 00000000 00000000
Call trace: 
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:61c88647 r9:85426000 r8:853a43ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r5:85426c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84952540
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85426c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab9f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8535eb8c r4:8535e800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8535eb8c r4:8538bc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85426c00 r8:8538bc2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8538bc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8538bc00 r8:80287e08 r7:eb1b9e60 r6:8538bc80 r5:85426c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3d9fb0 to 0xeb3d9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8438a700
INFO: task kworker/0:168:4918 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   ba5a8000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb41de08
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
dfa0:                                     00000000 00000000 00000000 00000000
Call trace: 
Exception stack(0xdff9dd28 to 0xdff9dd70)
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:731:4923 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:731   state:D stack:0     pid:4923  tgid:4923  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb421d84 r8:00000002 r7:60000113 r6:eb421d8c r5:85346c00
 r4:85346c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85346c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb421e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9ec0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85346c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0d5000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:85403f8c r4:85403c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
Exception stack(0xdff9dfb0 to 0xdff9dff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84bd8000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb425e08
 r9:83018205 r8:84bd8000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
 r7:ddde2d80 r6:83018200 r5:8540438c r4:853a4500
 r10:00000000 r9:853a4500 r8:80287e08 r7:eb421e60 r6:8538be00 r5:84bd8000
INFO: task kworker/1:732:4925 is blocked on a mutex likely owned by task kworker/1:139:3474.
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r4:84bd8c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84bd8c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb429e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493b240
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84bd8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb117000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8540478c r4:85404400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8540478c r4:853a4580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84bd8c00 r8:853a45ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:853a4580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a4580 r8:80287e08 r7:eb425e60 r6:8538be80 r5:84bd8c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb429fb0 to 0xeb429ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8493b080
INFO: task kworker/1:733:4927 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   bad8e000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
dfa0:                                     00000000 00000000 00000000 00000000
      Not tainted 6.15.0-rc6-syzkaller #0
 r4:84bd9800
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb42de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493b300
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84bd9800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb13b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85404b8c r4:85404800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85404b8c r4:853a4600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84bd9800 r8:853a462c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:853a4600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:00000000
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r4:dff9ddc0
 r5:00001000 r4:dfb17000
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018205 r8:84bda400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:853a4680 r8:80287e08 r7:eb42de60 r6:8538bf80 r5:84bda400
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   bb376000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:736:4933 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:736   state:D stack:0     pid:4933  tgid:4933  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb439d84 r8:00000002 r7:60000113 r6:eb439d8c r5:84bdbc00
 r4:84bdbc00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84bdbc00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb439e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493b640
 r4:00000000
 r5:00001000 r4:eb291000
 r5:8540538c r4:85405000
 r7:ddde2d80 r6:83018200 r5:8540538c r4:853a4700
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
Exception stack(0xdff9dd28 to 0xdff9dd70)
 r4:82ac21e4
 r4:dff9ddc0
 r5:00001000 r4:dfb17000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb441d84 r8:00000002 r7:60000113 r6:eb441d8c r5:84bdb000
 r4:84bdb000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84bdb000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb441e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493b840
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84bdb000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2d5000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85405b8c r4:85405800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85405b8c r4:853a4780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84bdb000 r8:853a47ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:853a4780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a4780 r8:80287e08 r7:eb439e60 r6:84817080 r5:84bdb000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb441fb0 to 0xeb441ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8493b340
INFO: task kworker/1:737:4935 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   bb7da000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
 r5:84bde000 r4:8291a680
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:00001000 r4:eb2cb000
 r5:8540578c r4:85405400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdff9dd28 to 0xdff9dd70)
 r4:82ac21e4
 r4:dff9ddc0
 r5:00001000 r4:dfb17000
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8291a684 r9:eb44dd84 r8:00000002 r7:60000113 r6:eb44dd8c r5:84bdc800
 r4:84bdc800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84bdc800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb44de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386480
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84bdc800 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa5b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85405f8c r4:85405c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85405f8c r4:853a4880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84bdc800 r8:853a48ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:853a4880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a4880 r8:80287e08 r7:eb441e60 r6:84817180 r5:84bdc800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb44dfb0 to 0xeb44dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8493b680
INFO: task kworker/1:739:4938 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   bb7da000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:740:4940 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:740   state:D stack:0     pid:4940  tgid:4940  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb455d84 r8:00000002 r7:60000013 r6:eb455d8c r5:853d8000
 r4:853d8000
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:8540638c r4:85406000
 r7:ddde2d80 r6:83018200 r5:8540638c r4:853a4900
 r10:00000000 r9:853a4900 r8:80287e08 r7:eb44de60 r6:84817200 r5:853d8000
INFO: task kworker/1:740:4940 is blocked on a mutex likely owned by task kworker/1:139:3474.
Exception stack(0xdff9dd28 to 0xdff9dd70)
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r5:8533ec00 r4:8291a680
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:8540678c r4:85406400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8540678c r4:853a4980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8533ec00 r8:853a49ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:853a4980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a4980 r8:80287e08 r7:eb455e60 r6:853a4a00 r5:8533ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb481fb0 to 0xeb481ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8493bf40
INFO: task kworker/1:741:4949 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   bc8bb000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:742:4950 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:742   state:D stack:0     pid:4950  tgid:4950  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb485d84 r8:00000002 r7:60000013 r6:eb485d8c r5:8533bc00
 r4:8533bc00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8533bc00 r4:8291a680
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb485e08
 r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
 r5:8541d78c r4:8541d400
 r10:61c88647 r9:8533bc00 r8:853a4aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r5:84553b8c r4:84553800
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb489e08
 r4:00000000
 r5:85406b8c r4:85406800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8438a200
INFO: task kworker/1:743:4951 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   bc8bb000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:744:4952 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:744   state:D stack:0     pid:4952  tgid:4952  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb48dd84 r8:00000002 r7:60000113 r6:eb48dd8c r5:8533d400
 r4:8533d400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8533d400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb48de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493bd80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8533d400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:85406f8c r4:85406c00
 r10:61c88647 r9:8533d400 r8:853a4cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfa0:                                     00000000 00000000 00000000 00000000
Call trace: 
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:8291a684 r9:eb491d84 r8:00000002 r7:60000113 r6:eb491d8c r5:85338000
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84952600
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:85338000 r8:848172ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84817280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84817280 r8:80287e08 r7:eb1b9e60 r6:853a4d80 r5:85338000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb491fb0 to 0xeb491ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849524c0
INFO: task kworker/0:169:4953 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   bceaa000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:745:4954 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:745   state:D stack:0     pid:4954  tgid:4954  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb495d84 r8:00000002 r7:60000013 r6:eb495d8c r5:85336c00
 r4:85336c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85336c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb495e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493be80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85336c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e89eb000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8540738c r4:85407000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8540738c r4:853a4e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85336c00 r8:853a4e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:853a4e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a4e00 r8:80287e08 r7:eb485e60 r6:853a4e80 r5:85336c00
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r4:dff9ddc0
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:8483ac80
 r4:00000001
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:853a4f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a4f00 r8:80287e08 r7:eb485e60 r6:853a4f80 r5:85428c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb49dfb0 to 0xeb49dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:843981c0
INFO: task kworker/1:746:4956 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   bd41c000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
      Not tainted 6.15.0-rc6-syzkaller #0
 r4:853d8c00
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018005 r8:853d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000
 r5:8535f38c r4:8535f000
 r7:dddced80 r6:83018000 r5:8535f38c r4:84817300
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r5:00001000 r4:dfb17000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
 r4:853db000
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84952c00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:853db000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eafdf000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8535fb8c r4:8535f800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8535fb8c r4:84817400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853db000 r8:8481742c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84817400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84817400 r8:80287e08 r7:eb1b9e60 r6:84817480 r5:853db000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4a1fb0 to 0xeb4a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849528c0
INFO: task kworker/0:171:4959 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   bd41c000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:172:4960 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:172   state:D stack:0     pid:4960  tgid:4960  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb3c9d84 r8:00000002 r7:60000113 r6:eb3c9d8c r5:853dbc00
 r4:853dbc00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853dbc00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84952c80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:853dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaffb000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8535ff8c r4:8535fc00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8535ff8c r4:84817500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853dbc00 r8:8481752c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84817500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84817500 r8:80287e08 r7:eb4a1e60 r6:84817580 r5:853dbc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3c9fb0 to 0xeb3c9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849528c0
INFO: task kworker/0:172:4960 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   bd8ba000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a5e08
 r4:00000000
 r5:84af538c r4:84af5000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:84817600 r8:80287e08 r7:eb3c9e60 r6:84817680 r5:853dd400
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
 r4:853de000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a9e08
 r9:83018005 r8:853de000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000
 r5:84af578c r4:84af5400
 r10:61c88647 r9:853de000 r8:8481772c r7:82804d40 r6:dddced80 r5:dddceda0
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   bdf00000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:747:4968 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:747   state:D stack:0     pid:4968  tgid:4968  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4add84 r8:00000002 r7:60000113 r6:eb4add8c r5:85428000
 r4:85428000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85428000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ade08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84398900
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85428000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb243000
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85407b8c r4:85407800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r5:80050013 r4:80239bb0
 r4:dff9ddc0
 r5:00001000 r4:dfb17000
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfa0:                                     00000000 00000000 00000000 00000000
      Not tainted 6.15.0-rc6-syzkaller #0
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4b1d84 r8:00000002 r7:60000013 r6:eb4b1d8c r5:8542b000
 r4:8542b000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8542b000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b1e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493bf00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8542b000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb157000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8545838c r4:85458000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8545838c r4:84817800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8542b000 r8:8481782c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84817800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84817800 r8:80287e08 r7:eb4a5e60 r6:84ae1100 r5:8542b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4b1fb0 to 0xeb4b1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84952b00
INFO: task kworker/0:175:4970 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   be67c000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:176:4972 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b5e08
 r5:00001000 r4:eb0ab000
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:8542bc00 r8:848178ac r7:82804d40 r6:dddced80 r5:dddceda0
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
 r4:00000001
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r4:00000000
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:853d9800 r8:8481792c r7:82804d40 r6:dddced80 r5:dddceda0
Exception stack(0xeb499fb0 to 0xeb499ff8)
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:80050013 r4:80239bb0
 r4:dff9ddc0
 r5:00001000 r4:dfb17000
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:178:4976 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:178   state:D stack:0     pid:4976  tgid:4976  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4bdd84 r8:00000002 r7:60000113 r6:eb4bdd8c r5:853dec00
 r4:853dec00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853dec00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4bde08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490f3c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:853dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb1bd000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85458b8c r4:85458800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85458b8c r4:84817a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853dec00 r8:84817a2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84817a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84817a00 r8:80287e08 r7:eb499e60 r6:84817a80 r5:853dec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4bdfb0 to 0xeb4bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8490f1c0
INFO: task kworker/0:178:4976 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   bf11f000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r5:00001000 r4:eb225000
 r5:8545938c r4:85459000
 r10:61c88647 r9:8533e000 r8:84817b2c r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:84839bc0
task:kworker/0:180   state:D stack:0     pid:4980  tgid:4980  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4c5d84 r8:00000002 r7:60000013 r6:eb4c5d8c r5:84bdec00
 r4:84bdec00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84bdec00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c5e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490f580
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84bdec00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb201000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85458f8c r4:85458c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85458f8c r4:84817c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84bdec00 r8:84817c2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84817c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84817c00 r8:80287e08 r7:eb4c1e60 r6:84817c80 r5:84bdec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4c5fb0 to 0xeb4c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8490f840
INFO: task kworker/0:180:4980 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   bf2fb000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:181:4982 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Workqueue: events bpf_prog_free_deferred
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c9e08
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84817d00 r8:80287e08 r7:eb4c1e60 r6:84817d80 r5:853da400
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:182:4983 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:182   state:D stack:0     pid:4983  tgid:4983  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4cdd84 r8:00000002 r7:60000113 r6:eb4cdd8c r5:853dc800
 r4:853dc800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853dc800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4cde08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490fc00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:853dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb31f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85459b8c r4:85459800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85459b8c r4:84817e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853dc800 r8:84817e2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84817e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84817e00 r8:80287e08 r7:eb4c9e60 r6:84817e80 r5:853dc800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4cdfb0 to 0xeb4cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8490f6c0
INFO: task kworker/0:182:4983 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   bf8bf000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r5:85459f8c r4:85459c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:8490fcc0
Call trace: 
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   bfe74000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:184:4988 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:184   state:D stack:0     pid:4988  tgid:4988  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4b9d84 r8:00000002 r7:60000113 r6:eb4b9d8c r5:853e1800
 r4:853e1800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853e1800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b9e08
 r4:00000000
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c0400000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
dfa0:                                     00000000 00000000 00000000 00000000
task:kworker/1:748   state:D stack:0     pid:4989  tgid:4989  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492a600
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r7:ddde2d80 r6:83018200 r5:85407f8c r4:84ae1200
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Exception stack(0xdff9dd28 to 0xdff9dd70)
 r4:82ac21e4
 r4:00000000
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/0:185:4992 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:185   state:D stack:0     pid:4992  tgid:4992  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4e5d84 r8:00000002 r7:60000113 r6:eb4e5d8c r5:8542ec00
 r4:8542ec00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8542ec00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e5e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490ff40
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8542ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb3b1000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8545a38c r4:8545a000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8545a38c r4:8438d100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8542ec00 r8:8438d12c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8438d100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8438d100 r8:80287e08 r7:eb4b9e60 r6:84ae1300 r5:8542ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4e5fb0 to 0xeb4e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8490f180
INFO: task kworker/0:185:4992 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c0400000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
dfa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:8438d180 r8:80287e08 r7:eb4b9e60 r6:84ae1380 r5:8542d400
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:82ac21e4
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:187:4995 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:187   state:D stack:0     pid:4995  tgid:4995  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4fdd84 r8:00000002 r7:60000113 r6:eb4fdd8c r5:8542a400
 r4:8542a400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8542a400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:8542a400 r8:8438d22c r7:82804d40 r6:dddced80 r5:dddceda0
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
dd20:                   c0985000 dfafb000 00000001 80239b98 7f151000 00000001
 r4:00000000
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
dfa0:                                     00000000 00000000 00000000 00000000
 r4:8542e000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8542e000 r4:8291a680
 r10:00000000 r9:8438d280 r8:80287e08 r7:eb4b9e60 r6:84ae1480 r5:8542e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb505fb0 to 0xeb505ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84b67180
INFO: task kworker/0:188:4997 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c0985000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:189:4999 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:189   state:D stack:0     pid:4999  tgid:4999  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb519d84 r8:00000002 r7:60000113 r6:eb519d8c r5:85430c00
 r4:85430c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85430c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb519e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b673c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85430c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb50d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8545b38c r4:8545b000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8545b38c r4:8438d300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85430c00 r8:8438d32c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8438d300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8438d300 r8:80287e08 r7:eb4b9e60 r6:84ae1500 r5:85430c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb519fb0 to 0xeb519ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84b67280
INFO: task kworker/0:189:4999 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c0f97000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:190:5001 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:190   state:D stack:0     pid:5001  tgid:5001  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb521d84 r8:00000002 r7:60000113 r6:eb521d8c r5:85430000
 r4:85430000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85430000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb521e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b675c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85430000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb523000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8545b78c r4:8545b400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8545b78c r4:8438d380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85430000 r8:8438d3ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8438d380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8438d380 r8:80287e08 r7:eb4b9e60 r6:84ae1580 r5:85430000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb521fb0 to 0xeb521ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84b67400
INFO: task kworker/0:190:5001 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c0f97000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:191:5004 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:191   state:D stack:0     pid:5004  tgid:5004  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb539d84 r8:00000002 r7:60000013 r6:eb539d8c r5:85431800
 r4:85431800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85431800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb539e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b67840
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85431800 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb53f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8545bf8c r4:8545bc00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8545bf8c r4:8438d400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85431800 r8:8438d42c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8438d400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8438d400 r8:80287e08 r7:eb4b9e60 r6:84ae1600 r5:85431800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb539fb0 to 0xeb539ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84b67500
INFO: task kworker/0:191:5004 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c14d4000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:192:5005 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:192   state:D stack:0     pid:5005  tgid:5005  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb53dd84 r8:00000002 r7:60000113 r6:eb53dd8c r5:85433c00
 r4:85433c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85433c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb53de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b67a00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85433c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb55b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8546078c r4:85460400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8546078c r4:8438d480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85433c00 r8:8438d4ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8438d480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8438d480 r8:80287e08 r7:eb539e60 r6:84ae1680 r5:85433c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb53dfb0 to 0xeb53dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84b67640
INFO: task kworker/0:192:5005 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c15ae000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:193:5007 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:193   state:D stack:0     pid:5007  tgid:5007  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb551d84 r8:00000002 r7:60000113 r6:eb551d8c r5:85434800
 r4:85434800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85434800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb551e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b67900
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85434800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb545000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8546038c r4:85460000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8546038c r4:8438d500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85434800 r8:8438d52c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8438d500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8438d500 r8:80287e08 r7:eb53de60 r6:84ae1700 r5:85434800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb551fb0 to 0xeb551ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84b67780
INFO: task kworker/0:193:5007 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c15ae000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:194:5009 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:194   state:D stack:0     pid:5009  tgid:5009  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb559d84 r8:00000002 r7:60000013 r6:eb559d8c r5:85433000
 r4:85433000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85433000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb559e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b67b40
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85433000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb561000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85460b8c r4:85460800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85460b8c r4:8438d580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85433000 r8:8438d5ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8438d580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8438d580 r8:80287e08 r7:eb53de60 r6:84ae1780 r5:85433000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb559fb0 to 0xeb559ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84b67640
INFO: task kworker/0:194:5009 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c20a3000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:195:5012 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:195   state:D stack:0     pid:5012  tgid:5012  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb571d84 r8:00000002 r7:60000013 r6:eb571d8c r5:85435400
 r4:85435400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85435400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb571e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b67d40
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85435400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb573000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85460f8c r4:85460c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85460f8c r4:8438d600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85435400 r8:8438d62c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8438d600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8438d600 r8:80287e08 r7:eb559e60 r6:84ae1800 r5:85435400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb571fb0 to 0xeb571ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84b67a40
INFO: task kworker/0:195:5012 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c20a3000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:196:5014 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:196   state:D stack:0     pid:5014  tgid:5014  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb57dd84 r8:00000002 r7:60000113 r6:eb57dd8c r5:85432400
 r4:85432400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85432400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb57de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84398c40
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85432400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb587000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8546178c r4:85461400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8546178c r4:8438d680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85432400 r8:8438d6ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8438d680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8438d680 r8:80287e08 r7:eb571e60 r6:84ae1880 r5:85432400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb57dfb0 to 0xeb57dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84b67c80
INFO: task kworker/0:196:5014 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c20a3000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:197:5015 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:197   state:D stack:0     pid:5015  tgid:5015  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb581d84 r8:00000002 r7:60000113 r6:eb581d8c r5:85436c00
 r4:85436c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85436c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb581e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b67ec0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85436c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb579000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8546138c r4:85461000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8546138c r4:8438d700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85436c00 r8:8438d72c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8438d700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8438d700 r8:80287e08 r7:eb57de60 r6:84ae1900 r5:85436c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb581fb0 to 0xeb581ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84b67c80
INFO: task kworker/0:197:5015 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c20a3000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:198:5018 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:198   state:D stack:0     pid:5018  tgid:5018  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb595d84 r8:00000002 r7:60000113 r6:eb595d8c r5:85429800
 r4:85429800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85429800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb595e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f000
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85429800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb5a9000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8546238c r4:85462000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8546238c r4:8438d780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85429800 r8:8438d7ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8438d780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8438d780 r8:80287e08 r7:eb57de60 r6:84ae1980 r5:85429800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb595fb0 to 0xeb595ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84398e00
INFO: task kworker/0:198:5018 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c24d7000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:199:5019 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:199   state:D stack:0     pid:5019  tgid:5019  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb59dd84 r8:00000002 r7:60000113 r6:eb59dd8c r5:85438000
 r4:85438000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85438000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb59de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490f1c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85438000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb58d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85461b8c r4:85461800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85461b8c r4:8438d800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85438000 r8:8438d82c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8438d800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8438d800 r8:80287e08 r7:eb595e60 r6:84ae1a00 r5:85438000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb59dfb0 to 0xeb59dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84398e00
INFO: task kworker/0:199:5019 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c29a9000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:200:5022 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:200   state:D stack:0     pid:5022  tgid:5022  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5b1d84 r8:00000002 r7:60000113 r6:eb5b1d8c r5:8543a400
 r4:8543a400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8543a400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b1e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849520c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8543a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb5a3000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85461f8c r4:85461c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85461f8c r4:8438d880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8543a400 r8:8438d8ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8438d880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8438d880 r8:80287e08 r7:eb595e60 r6:84ae1a80 r5:8543a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5b1fb0 to 0xeb5b1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84952200
INFO: task kworker/0:200:5022 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c29a9000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:201:5024 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:201   state:D stack:0     pid:5024  tgid:5024  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5bdd84 r8:00000002 r7:60000113 r6:eb5bdd8c r5:85438c00
 r4:85438c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85438c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5bde08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f1c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85438c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb5bf000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8546278c r4:85462400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8546278c r4:8438d900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85438c00 r8:8438d92c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8438d900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8438d900 r8:80287e08 r7:eb595e60 r6:84ae1b00 r5:85438c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5bdfb0 to 0xeb5bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8538f100
INFO: task kworker/0:201:5024 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c2d8d000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:202:5026 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:202   state:D stack:0     pid:5026  tgid:5026  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5cdd84 r8:00000002 r7:60000013 r6:eb5cdd8c r5:85439800
 r4:85439800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85439800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5cde08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85439800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb5c5000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85462b8c r4:85462800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85462b8c r4:8438d980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85439800 r8:8438d9ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8438d980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8438d980 r8:80287e08 r7:eb5bde60 r6:84ae1b80 r5:85439800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5cdfb0 to 0xeb5cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8538f180
INFO: task kworker/0:202:5026 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c318c000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:203:5027 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:203   state:D stack:0     pid:5027  tgid:5027  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5d5d84 r8:00000002 r7:60000113 r6:eb5d5d8c r5:8543b000
 r4:8543b000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8543b000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d5e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f500
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8543b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb5dd000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85462f8c r4:85462c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85462f8c r4:8438da00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8543b000 r8:8438da2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8438da00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8438da00 r8:80287e08 r7:eb5cde60 r6:84ae1c00 r5:8543b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5d5fb0 to 0xeb5d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8538f440
INFO: task kworker/0:203:5027 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c318c000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:749:5030 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:749   state:D stack:0     pid:5030  tgid:5030  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4d5d84 r8:00000002 r7:60000113 r6:eb4d5d8c r5:8543c800
 r4:8543c800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8543c800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f4c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8543c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb5eb000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8546338c r4:85463000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8546338c r4:84ae1c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8543c800 r8:84ae1cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84ae1c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84ae1c80 r8:80287e08 r7:eb485e60 r6:84ae1d00 r5:8543c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4d5fb0 to 0xeb4d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8492a340
INFO: task kworker/1:749:5030 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c330c000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:204:5031 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:204   state:D stack:0     pid:5031  tgid:5031  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5e1d84 r8:00000002 r7:60000113 r6:eb5e1d8c r5:8543d400
 r4:8543d400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8543d400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e1e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f680
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8543d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb5f1000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8546378c r4:85463400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8546378c r4:8438da80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8543d400 r8:8438daac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8438da80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8438da80 r8:80287e08 r7:eb5d5e60 r6:84ae1d80 r5:8543d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5e1fb0 to 0xeb5e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8538f380
INFO: task kworker/0:204:5031 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c330c000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:750:5034 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:750   state:D stack:0     pid:5034  tgid:5034  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5f5d84 r8:00000002 r7:60000113 r6:eb5f5d8c r5:8543bc00
 r4:8543bc00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8543bc00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f5e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386500
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8543bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfcdb000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541c38c r4:8541c000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8541c38c r4:84ae1e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8543bc00 r8:84ae1e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84ae1e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84ae1e00 r8:80287e08 r7:eb485e60 r6:84ae1e80 r5:8543bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5f5fb0 to 0xeb5f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8492ae80
INFO: task kworker/1:750:5034 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c3602000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:205:5036 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:205   state:D stack:0     pid:5036  tgid:5036  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb609d84 r8:00000002 r7:60000113 r6:eb609d8c r5:8543ec00
 r4:8543ec00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8543ec00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb609e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f7c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8543ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb5ff000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85463b8c r4:85463800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85463b8c r4:8438db00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8543ec00 r8:8438db2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8438db00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8438db00 r8:80287e08 r7:eb5e1e60 r6:84ae1f00 r5:8543ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb609fb0 to 0xeb609ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8538f6c0
INFO: task kworker/0:205:5036 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c3602000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:206:5038 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:206   state:D stack:0     pid:5038  tgid:5038  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb611d84 r8:00000002 r7:60000113 r6:eb611d8c r5:854c8000
 r4:854c8000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:854c8000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb611e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae3200
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:854c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb6b5000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85464b8c r4:85464800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85464b8c r4:8438db80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:854c8000 r8:8438dbac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8438db80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8438db80 r8:80287e08 r7:eb609e60 r6:84ae1f80 r5:854c8000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb611fb0 to 0xeb611ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8538f6c0
INFO: task kworker/0:206:5038 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c3602000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:207:5039 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:207   state:D stack:0     pid:5039  tgid:5039  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb615d84 r8:00000002 r7:60000013 r6:eb615d8c r5:854c8c00
 r4:854c8c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:854c8c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb615e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538fa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:854c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb605000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85463f8c r4:85463c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85463f8c r4:8438dc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:854c8c00 r8:8438dc2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8438dc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8438dc00 r8:80287e08 r7:eb611e60 r6:85382000 r5:854c8c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb615fb0 to 0xeb615ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8538f6c0
INFO: task kworker/0:207:5039 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c3cb6000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:208:5041 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:208   state:D stack:0     pid:5041  tgid:5041  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5c9d84 r8:00000002 r7:60000113 r6:eb5c9d8c r5:853e2400
 r4:853e2400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853e2400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538fb00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:853e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb61f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8546438c r4:85464000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8546438c r4:8438dc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853e2400 r8:8438dcac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8438dc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8438dc80 r8:80287e08 r7:eb611e60 r6:8438dd00 r5:853e2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5c9fb0 to 0xeb5c9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8538f9c0
INFO: task kworker/0:208:5041 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c40cb000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:751:5045 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:751   state:D stack:0     pid:5045  tgid:5045  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb62dd84 r8:00000002 r7:60000013 r6:eb62dd8c r5:853e4800
 r4:853e4800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853e4800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb62de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386600
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e056d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541c78c r4:8541c400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8541c78c r4:85382080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853e4800 r8:853820ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85382080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85382080 r8:80287e08 r7:eb485e60 r6:8438dd80 r5:853e4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb62dfb0 to 0xeb62dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85386780
INFO: task kworker/1:751:5045 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c40cb000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:209:5047 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:209   state:D stack:0     pid:5047  tgid:5047  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb635d84 r8:00000002 r7:60000113 r6:eb635d8c r5:853e5400
 r4:853e5400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853e5400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb635e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386dc0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:853e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae67000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541df8c r4:8541dc00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8541df8c r4:8438de00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853e5400 r8:8438de2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8438de00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8438de00 r8:80287e08 r7:eb611e60 r6:8438de80 r5:853e5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb635fb0 to 0xeb635ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8538fc00
INFO: task kworker/0:209:5047 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c40cb000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:752:5048 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:752   state:D stack:0     pid:5048  tgid:5048  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb639d84 r8:00000002 r7:60000013 r6:eb639d8c r5:853e6c00
 r4:853e6c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853e6c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb639e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853867c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0799000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541cb8c r4:8541c800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8541cb8c r4:85382100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853e6c00 r8:8538212c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85382100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85382100 r8:80287e08 r7:eb485e60 r6:8438df00 r5:853e6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb639fb0 to 0xeb639ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85386640
INFO: task kworker/1:752:5048 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c40cb000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:753:5050 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:753   state:D stack:0     pid:5050  tgid:5050  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb641d84 r8:00000002 r7:60000013 r6:eb641d8c r5:853e6000
 r4:853e6000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853e6000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb641e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386700
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0861000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541cf8c r4:8541cc00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8541cf8c r4:85382180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853e6000 r8:853821ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85382180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85382180 r8:80287e08 r7:eb485e60 r6:8438df80 r5:853e6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb641fb0 to 0xeb641ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85386a40
INFO: task kworker/1:753:5050 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c46ac000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:754:5052 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:754   state:D stack:0     pid:5052  tgid:5052  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb649d84 r8:00000002 r7:60000113 r6:eb649d8c r5:853e0000
 r4:853e0000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853e0000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb649e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386a00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac5f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541d38c r4:8541d000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8541d38c r4:85382200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853e0000 r8:8538222c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85382200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85382200 r8:80287e08 r7:eb485e60 r6:8538d000 r5:853e0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb649fb0 to 0xeb649ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85386b00
INFO: task kworker/1:754:5052 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c46ac000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:755:5054 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:755   state:D stack:0     pid:5054  tgid:5054  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb651d84 r8:00000002 r7:60000013 r6:eb651d8c r5:853e3000
 r4:853e3000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853e3000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb651e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492ad00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaec5000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541e78c r4:8541e400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8541e78c r4:85382300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853e3000 r8:8538232c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85382300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85382300 r8:80287e08 r7:eb485e60 r6:8538d080 r5:853e3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb651fb0 to 0xeb651ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85386c40
INFO: task kworker/1:755:5054 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c4804000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:756:5056 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:756   state:D stack:0     pid:5056  tgid:5056  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb659d84 r8:00000002 r7:60000013 r6:eb659d8c r5:853e3c00
 r4:853e3c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:853e3c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb659e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386d00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:853e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541db8c r4:8541d800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8541db8c r4:85382280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:853e3c00 r8:853822ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85382280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85382280 r8:80287e08 r7:eb651e60 r6:8538d100 r5:853e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb659fb0 to 0xeb659ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85386bc0
INFO: task kworker/1:756:5056 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c4804000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:757:5059 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:757   state:D stack:0     pid:5059  tgid:5059  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb629d84 r8:00000002 r7:60000013 r6:eb629d8c r5:85490000
 r4:85490000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85490000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb629e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386d80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85490000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae99000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541e38c r4:8541e000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8541e38c r4:85382380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85490000 r8:853823ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85382380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85382380 r8:80287e08 r7:eb651e60 r6:8538d200 r5:85490000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb629fb0 to 0xeb629ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85386e40
INFO: task kworker/1:757:5059 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c4af2000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:210:5060 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:210   state:D stack:0     pid:5060  tgid:5060  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb65dd84 r8:00000002 r7:60000113 r6:eb65dd8c r5:85490c00
 r4:85490c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85490c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb65de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853925c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85490c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf2d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8546478c r4:85464400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8546478c r4:8538d180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85490c00 r8:8538d1ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8538d180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8538d180 r8:80287e08 r7:eb611e60 r6:8538d280 r5:85490c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb65dfb0 to 0xeb65dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85392240
INFO: task kworker/0:210:5060 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c4ee6000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:758:5062 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:758   state:D stack:0     pid:5062  tgid:5062  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb661d84 r8:00000002 r7:60000013 r6:eb661d8c r5:85491800
 r4:85491800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85491800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb661e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493b8c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85491800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0b9000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541ef8c r4:8541ec00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8541ef8c r4:85382400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85491800 r8:8538242c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85382400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85382400 r8:80287e08 r7:eb651e60 r6:8538d300 r5:85491800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb661fb0 to 0xeb661ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85386e40
INFO: task kworker/1:758:5062 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c4fa9000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:759:5065 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:759   state:D stack:0     pid:5065  tgid:5065  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb665d84 r8:00000002 r7:60000113 r6:eb665d8c r5:85492400
 r4:85492400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85492400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb665e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f400
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85492400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaefd000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541eb8c r4:8541e800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8541eb8c r4:85382480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85492400 r8:853824ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85382480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85382480 r8:80287e08 r7:eb661e60 r6:8538d380 r5:85492400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb665fb0 to 0xeb665ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8538fbc0
INFO: task kworker/1:759:5065 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c4fa9000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:760:5068 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:760   state:D stack:0     pid:5068  tgid:5068  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb61dd84 r8:00000002 r7:60000113 r6:eb61dd8c r5:85493000
 r4:85493000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85493000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb61de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398000
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85493000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb119000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541f78c r4:8541f400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8541f78c r4:85382500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85493000 r8:8538252c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85382500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85382500 r8:80287e08 r7:eb661e60 r6:8538d400 r5:85493000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb61dfb0 to 0xeb61dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8538fdc0
INFO: task kworker/1:760:5068 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c56b8000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:761:5071 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:761   state:D stack:0     pid:5071  tgid:5071  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb671d84 r8:00000002 r7:60000113 r6:eb671d8c r5:85495400
 r4:85495400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85495400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb671e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853863c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85495400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0fb000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541f38c r4:8541f000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8541f38c r4:85382580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85495400 r8:853825ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85382580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85382580 r8:80287e08 r7:eb61de60 r6:8538d580 r5:85495400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb671fb0 to 0xeb671ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8492a040
INFO: task kworker/1:761:5071 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c56b8000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:762:5073 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:762   state:D stack:0     pid:5073  tgid:5073  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb679d84 r8:00000002 r7:60000113 r6:eb679d8c r5:85496c00
 r4:85496c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85496c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb679e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398180
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85496c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb145000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541fb8c r4:8541f800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8541fb8c r4:85382600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85496c00 r8:8538262c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85382600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85382600 r8:80287e08 r7:eb61de60 r6:8538d600 r5:85496c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb679fb0 to 0xeb679ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853980c0
INFO: task kworker/1:762:5073 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c5bfa000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:763:5075 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:763   state:D stack:0     pid:5075  tgid:5075  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb655d84 r8:00000002 r7:60000013 r6:eb655d8c r5:854cb000
 r4:854cb000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:854cb000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb655e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398480
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:854cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2d3000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550038c r4:85500000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550038c r4:85382680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:854cb000 r8:853826ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85382680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85382680 r8:80287e08 r7:eb679e60 r6:85382700 r5:854cb000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb655fb0 to 0xeb655ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85398140
INFO: task kworker/1:763:5075 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c5bfa000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:764:5077 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:764   state:D stack:0     pid:5077  tgid:5077  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb66dd84 r8:00000002 r7:60000113 r6:eb66dd8c r5:854cbc00
 r4:854cbc00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:854cbc00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb66de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398240
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:854cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2c3000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541ff8c r4:8541fc00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8541ff8c r4:85382780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:854cbc00 r8:853827ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85382780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85382780 r8:80287e08 r7:eb655e60 r6:85382800 r5:854cbc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb66dfb0 to 0xeb66dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85398140
INFO: task kworker/1:764:5077 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c5f3f000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:765:5079 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:765   state:D stack:0     pid:5079  tgid:5079  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb689d84 r8:00000002 r7:60000113 r6:eb689d8c r5:84968000
 r4:84968000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84968000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb689e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398540
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84968000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2e9000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550078c r4:85500400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550078c r4:85382880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84968000 r8:853828ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85382880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85382880 r8:80287e08 r7:eb655e60 r6:8538d680 r5:84968000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb689fb0 to 0xeb689ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85398440
INFO: task kworker/1:765:5079 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c5f3f000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:766:5081 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:766   state:D stack:0     pid:5081  tgid:5081  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb691d84 r8:00000002 r7:60000113 r6:eb691d8c r5:84969800
 r4:84969800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84969800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb691e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853989c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84969800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb3f5000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550138c r4:85501000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550138c r4:85382900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84969800 r8:8538292c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85382900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85382900 r8:80287e08 r7:eb689e60 r6:8538d700 r5:84969800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb691fb0 to 0xeb691ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85398580
INFO: task kworker/1:766:5081 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c6394000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:767:5082 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:767   state:D stack:0     pid:5082  tgid:5082  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb695d84 r8:00000002 r7:60000113 r6:eb695d8c r5:8496a400
 r4:8496a400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8496a400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb695e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398680
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8496a400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2fd000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85500b8c r4:85500800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85500b8c r4:85382a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8496a400 r8:85382a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85382a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85382a00 r8:80287e08 r7:eb691e60 r6:8538d780 r5:8496a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb695fb0 to 0xeb695ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85398800
INFO: task kworker/1:767:5082 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c6394000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:768:5084 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:768   state:D stack:0     pid:5084  tgid:5084  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb69dd84 r8:00000002 r7:60000113 r6:eb69dd8c r5:84968c00
 r4:84968c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84968c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb69de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853986c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84968c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb3eb000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85500f8c r4:85500c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85500f8c r4:85382a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84968c00 r8:85382aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85382a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85382a80 r8:80287e08 r7:eb691e60 r6:8538d800 r5:84968c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb69dfb0 to 0xeb69dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85398940
INFO: task kworker/1:768:5084 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c6a7e000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:770:5088 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:770   state:D stack:0     pid:5088  tgid:5088  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6add84 r8:00000002 r7:60000113 r6:eb6add8c r5:8496d400
 r4:8496d400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8496d400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ade08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398b40
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8496d400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb43b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550178c r4:85501400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550178c r4:85382b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8496d400 r8:85382b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85382b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85382b00 r8:80287e08 r7:eb6a5e60 r6:8538d900 r5:8496d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6adfb0 to 0xeb6adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853988c0
INFO: task kworker/1:770:5088 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c6a7e000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:771:5090 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:771   state:D stack:0     pid:5090  tgid:5090  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6b9d84 r8:00000002 r7:60000113 r6:eb6b9d8c r5:8496ec00
 r4:8496ec00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8496ec00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398c80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8496ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb445000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85501b8c r4:85501800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85501b8c r4:85382b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8496ec00 r8:85382bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85382b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85382b80 r8:80287e08 r7:eb6a5e60 r6:8538d980 r5:8496ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6b9fb0 to 0xeb6b9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85398bc0
INFO: task kworker/1:771:5090 is blocked on a mutex likely owned by task kworker/1:139:3474.
task:kworker/1:139   state:R  running task     stack:0     pid:3474  tgid:3474  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff9dd28 to 0xdff9dd70)
dd20:                   c6a7e000 dfafb000 00000001 80239b98 7f151000 00000001
dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78
dd60: 80230ad0 80239bb0 80050013 ffffffff
 r5:80050013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08
 r4:dff9ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84553b8c r4:84553800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8483ac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84839bc0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT 
Hardware name: ARM-Versatile Express
Call trace: 
[<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257)
 r7:00000000 r6:00050113 r5:60050193 r4:82257d54
[<80201ac8>] (show_stack) from [<8022003c>] (__dump_stack lib/dump_stack.c:94 [inline])
[<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120)
[<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c lib/dump_stack.c:129)
 r5:00000001 r4:00000001
[<80220048>] (dump_stack) from [<81a3cdcc>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113)
[<81a3cc6c>] (nmi_cpu_backtrace) from [<81a3cf18>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62)
 r7:00000001 r6:8280c610 r5:8281af00 r4:ffffffff
[<81a3cde8>] (nmi_trigger_cpumask_backtrace) from [<802304dc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852)
 r9:0000e6cb r8:82ab6564 r7:8280c788 r6:00007766 r5:8281b4c8 r4:85e1320c
[<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386da8>] (trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline])
[<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386da8>] (check_hung_uninterruptible_tasks kernel/hung_task.c:274 [inline])
[<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386da8>] (watchdog+0x4a8/0x69c kernel/hung_task.c:437)
[<80386900>] (watchdog) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:80386900 r7:8329e300 r6:8329e300 r5:832dc800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf8e1fb0 to 0xdf8e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8338a0c0
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 2819 Comm: pr/ttyAMA0 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT 
Hardware name: ARM-Versatile Express
PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline]
PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194
LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]
LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:614 [inline]
LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603
pc : [<81a5bfec>]    lr : [<80a629ec>]    psr: 60050013
sp : ebe09eb0  ip : ebe09ec0  fp : ebe09ebc
r10: 8295b3bc  r9 : 00000000  r8 : 00000000
r7 : 00000117  r6 : 8295b320  r5 : 00000000  r4 : 00000001
r3 : 0000b35d  r2 : 00000000  r1 : 60050013  r0 : 83327c40
Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
Control: 30c5387d  Table: 847d9040  DAC: fffffffd
Call trace: 
[<81a5bfc4>] (_raw_spin_unlock_irqrestore) from [<80a629ec>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline])
[<81a5bfc4>] (_raw_spin_unlock_irqrestore) from [<80a629ec>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:614 [inline])
[<81a5bfc4>] (_raw_spin_unlock_irqrestore) from [<80a629ec>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603)
[<80a629cc>] (pl011_console_device_unlock) from [<802efd14>] (nbcon_emit_one+0x80/0xf8 kernel/printk/nbcon.c:1123)
[<802efc94>] (nbcon_emit_one) from [<802eff34>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1210)
 r6:8280c610 r5:83c78000 r4:8295b320
[<802efd8c>] (nbcon_kthread_func) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8295b320 r8:802efd8c r7:84252b00 r6:84252b00 r5:83c78000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe09fb0 to 0xebe09ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:842cbc80