Extracting prog: 11m37.499035251s
Minimizing prog: 4h4m49.619958682s
Simplifying prog options: 0s
Extracting C: 8m36.53437757s
Simplifying C: 58m43.06988598s


extracting reproducer from 1 programs
testing a last program of every proc
single: executing 1 programs separately with timeout 45s
testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-openat$cgroup_ro-mmap
detailed listing:
executing program 0:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000090000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r1}, 0x10)
r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r2, 0x0)

program did not crash
single: failed to extract reproducer
single: executing 1 programs separately with timeout 16m0s
testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-openat$cgroup_ro-mmap
detailed listing:
executing program 0:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000090000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r1}, 0x10)
r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r2, 0x0)

program crashed: INFO: task hung in _vm_unmap_aliases
single: successfully extracted reproducer
found reproducer with 6 syscalls
minimizing guilty program
testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-openat$cgroup_ro
detailed listing:
executing program 0:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000090000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r1}, 0x10)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)

program crashed: INFO: task hung in _vm_unmap_aliases
testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN
detailed listing:
executing program 0:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000090000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r1}, 0x10)

program crashed: INFO: task hung in _vm_unmap_aliases
testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD
detailed listing:
executing program 0:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000090000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)

program crashed: INFO: task hung in _vm_unmap_aliases
testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD
detailed listing:
executing program 0:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000090000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)

program did not crash
testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD
detailed listing:
executing program 0:
bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)

program did not crash
testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$PROG_LOAD
detailed listing:
executing program 0:
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000090000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)

program did not crash
testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD
detailed listing:
executing program 0:
r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000090000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)

program did not crash
testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD
detailed listing:
executing program 0:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000090000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)

program did not crash
testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD
detailed listing:
executing program 0:
bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)

program did not crash
testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD
detailed listing:
executing program 0:
bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)

program did not crash
testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD
detailed listing:
executing program 0:
bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)

program did not crash
testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD
detailed listing:
executing program 0:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)

program did not crash
testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD
detailed listing:
executing program 0:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000090000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)

program did not crash
testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD
detailed listing:
executing program 0:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000090000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$PROG_LOAD(0x5, 0x0, 0x0)

program did not crash
testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD
detailed listing:
executing program 0:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000090000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)

program did not crash
testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD
detailed listing:
executing program 0:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000090000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)

program did not crash
extracting C reproducer
testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD
program crashed: INFO: task hung in _vm_unmap_aliases
simplifying C reproducer
testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD
program crashed: INFO: task hung in _vm_unmap_aliases
testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD
program crashed: INFO: task hung in _vm_unmap_aliases
testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD
program crashed: INFO: task hung in _vm_unmap_aliases
testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD
program crashed: INFO: task hung in _vm_unmap_aliases
testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD
program crashed: INFO: task hung in _vm_unmap_aliases
testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$PROG_LOAD
program crashed: INFO: task hung in _vm_unmap_aliases
reproducing took 5h23m46.723303692s
repro crashed as (corrupted=false):
INFO: task kworker/0:2:47 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:2     state:D stack:0     pid:47    tgid:47    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df921d84 r8:00000002 r7:60000013 r6:df921d8c r5:833d6000
 r4:833d6000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:833d6000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df921e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cbbfc0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:833d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eda85000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85d3378c r4:85d33400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85d3378c r4:833a3700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:833d6000 r8:833a372c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:833a3700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833a3700 r8:80287e08 r7:df83de60 r6:833a3780 r5:833d6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf921fb0 to 0xdf921ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8339fe40
INFO: task kworker/0:2:47 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   d08fa000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
INFO: task kworker/1:2:718 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:2     state:D stack:0     pid:718   tgid:718   ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e00ddd84 r8:00000002 r7:60000013 r6:e00ddd8c r5:83aa4800
 r4:83aa4800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83aa4800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00dde08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85337200
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83aa4800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbed000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855a4b8c r4:855a4800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:855a4b8c r4:83bdf280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83aa4800 r8:83bdf2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:83bdf280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:83bdf280 r8:80287e08 r7:df931e60 r6:83ae4c00 r5:83aa4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00ddfb0 to 0xe00ddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:83bde4c0
INFO: task kworker/1:2:718 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   d28bf000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
INFO: task kworker/1:3:723 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:3     state:D stack:0     pid:723   tgid:723   ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e043dd84 r8:00000002 r7:60000113 r6:e043dd8c r5:83aa6c00
 r4:83aa6c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83aa6c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e043de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849f7200
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83aa6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb727000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84581f8c r4:84581c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84581f8c r4:83bdf400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83aa6c00 r8:83bdf42c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:83bdf400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:83bdf400 r8:80287e08 r7:e00dde60 r6:83ae4c80 r5:83aa6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe043dfb0 to 0xe043dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:83bde940
INFO: task kworker/1:3:723 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   d4596000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
INFO: task kworker/0:0:3098 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:0     state:D stack:0     pid:3098  tgid:3098  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df99dd84 r8:00000002 r7:60000013 r6:df99dd8c r5:8452bc00
 r4:8452bc00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8452bc00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df99de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c6f7c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8452bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f011000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e00b9000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85d39f8c r4:85d39c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85d39f8c r4:8494ca00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8452bc00 r8:8494ca2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8494ca00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8494ca00 r8:80287e08 r7:df845e60 r6:8494c780 r5:8452bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf99dfb0 to 0xdf99dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8495d7c0
INFO: task kworker/0:0:3098 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   d5e31000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
INFO: task kworker/0:13:3137 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:13    state:D stack:0     pid:3137  tgid:3137  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfb1dd84 r8:00000002 r7:60000013 r6:dfb1dd8c r5:840aec00
 r4:840aec00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:840aec00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb1de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b17d40
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:840aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfad5000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851f478c r4:851f4400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851f478c r4:84b14080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:840aec00 r8:84b140ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84b14080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b14080 r8:80287e08 r7:dfa9de60 r6:84b14100 r5:840aec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb1dfb0 to 0xdfb1dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84af9ec0
INFO: task kworker/0:13:3137 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   d6eea000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
INFO: task kworker/1:1:3142 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:1     state:D stack:0     pid:3142  tgid:3142  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfb95d84 r8:00000002 r7:60000113 r6:dfb95d8c r5:840a8c00
 r4:840a8c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:840a8c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb95e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849de200
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:840a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa3d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84583b8c r4:84583800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84583b8c r4:8494e680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:840a8c00 r8:8494e6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8494e680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8494e680 r8:80287e08 r7:e043de60 r6:84b14200 r5:840a8c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb95fb0 to 0xdfb95ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849de180
INFO: task kworker/1:1:3142 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   d832d000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
INFO: task kworker/0:15:3144 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:15    state:D stack:0     pid:3144  tgid:3144  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfafdd84 r8:00000002 r7:60000113 r6:dfafdd8c r5:838c5400
 r4:838c5400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:838c5400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501cc40
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:838c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eacd1000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8520538c r4:85205000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8520538c r4:84b14280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:838c5400 r8:84b142ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84b14280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b14280 r8:80287e08 r7:dfb1de60 r6:8494e700 r5:838c5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfafdfb0 to 0xdfafdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8492c080
INFO: task kworker/0:15:3144 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   d832d000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
INFO: task kworker/0:16:3146 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:16    state:D stack:0     pid:3146  tgid:3146  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfb5dd84 r8:00000002 r7:60000113 r6:dfb5dd8c r5:838c2400
 r4:838c2400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:838c2400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb5de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85333e40
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:838c2400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa91000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853cfb8c r4:853cf800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:853cfb8c r4:84b14300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:838c2400 r8:84b1432c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84b14300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b14300 r8:80287e08 r7:dfafde60 r6:8494e580 r5:838c2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb5dfb0 to 0xdfb5dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8492c2c0
INFO: task kworker/0:16:3146 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   d8824000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
INFO: task kworker/0:17:3148 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:17    state:D stack:0     pid:3148  tgid:3148  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfbf5d84 r8:00000002 r7:60000113 r6:dfbf5d8c r5:838c0000
 r4:838c0000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:838c0000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf5e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8530f440
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:838c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb175000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85205b8c r4:85205800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85205b8c r4:84b14400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:838c0000 r8:84b1442c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84b14400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b14400 r8:80287e08 r7:dfb5de60 r6:8494e500 r5:838c0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbf5fb0 to 0xdfbf5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8492c600
INFO: task kworker/0:17:3148 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   d8824000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
INFO: task kworker/1:4:3150 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:4     state:D stack:0     pid:3150  tgid:3150  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfc15d84 r8:00000002 r7:60000113 r6:dfc15d8c r5:838c3000
 r4:838c3000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:838c3000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc15e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cc940
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:838c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb87000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855a478c r4:855a4400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:855a478c r4:8494e800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:838c3000 r8:8494e82c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8494e800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8494e800 r8:80287e08 r7:e043de60 r6:8494e300 r5:838c3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc15fb0 to 0xdfc15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849de3c0
INFO: task kworker/1:4:3150 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   d8a64000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:18:3151 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:18    state:D stack:0     pid:3151  tgid:3151  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfc19d84 r8:00000002 r7:60000113 r6:dfc19d8c r5:838c3c00
 r4:838c3c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:838c3c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc19e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8530f8c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:838c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb55000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8520638c r4:85206000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8520638c r4:84b14480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:838c3c00 r8:84b144ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84b14480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b14480 r8:80287e08 r7:dfb5de60 r6:8494e180 r5:838c3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc19fb0 to 0xdfc19ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8492c700
INFO: task kworker/0:18:3151 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   d8cb1000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:19:3154 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:19    state:D stack:0     pid:3154  tgid:3154  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfc41d84 r8:00000002 r7:60000113 r6:dfc41d8c r5:83a93c00
 r4:83a93c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83a93c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc41e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a7900
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83a93c00 r7:00000000 r6:83018000 r5:00001000 r4:7f011000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa15000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8520778c r4:85207400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8520778c r4:84b14380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a93c00 r8:84b143ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84b14380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b14380 r8:80287e08 r7:dfb5de60 r6:8494e100 r5:83a93c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc41fb0 to 0xdfc41ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8492c6c0
INFO: task kworker/0:19:3154 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   d8cb1000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:20:3156 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:20    state:D stack:0     pid:3156  tgid:3156  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfc81d84 r8:00000002 r7:60000113 r6:dfc81d8c r5:83aa3000
 r4:83aa3000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83aa3000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc81e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849990c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83aa3000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaef9000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853e478c r4:853e4400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:853e478c r4:84b14780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83aa3000 r8:84b147ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84b14780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b14780 r8:80287e08 r7:dfb5de60 r6:8494e000 r5:83aa3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc81fb0 to 0xdfc81ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8492cb00
INFO: task kworker/0:20:3156 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   d911d000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:22:3159 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:22    state:D stack:0     pid:3159  tgid:3159  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfca9d84 r8:00000002 r7:60000113 r6:dfca9d8c r5:838b3c00
 r4:838b3c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:838b3c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84999000
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:838b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff41000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853e638c r4:853e6000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:853e638c r4:84b14600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:838b3c00 r8:84b1462c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84b14600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b14600 r8:80287e08 r7:dfc89e60 r6:8494e980 r5:838b3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfca9fb0 to 0xdfca9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8492c080
INFO: task kworker/0:22:3159 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   d911d000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:23:3161 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:23    state:D stack:0     pid:3161  tgid:3161  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfccdd84 r8:00000002 r7:60000113 r6:dfccdd8c r5:83a91800
 r4:83a91800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83a91800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfccde08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533ba00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83a91800 r7:00000000 r6:83018000 r5:00001000 r4:7f077000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb44d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853e6b8c r4:853e6800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:853e6b8c r4:84b14500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a91800 r8:84b1452c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84b14500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b14500 r8:80287e08 r7:dfc89e60 r6:8494e900 r5:83a91800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfccdfb0 to 0xdfccdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8492cd40
INFO: task kworker/0:23:3161 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   d947b000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:24:3163 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:24    state:D stack:0     pid:3163  tgid:3163  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfcedd84 r8:00000002 r7:60000113 r6:dfcedd8c r5:84231800
 r4:84231800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84231800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcede08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b6f80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84231800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb299000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853e778c r4:853e7400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:853e778c r4:84b14680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84231800 r8:84b146ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84b14680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b14680 r8:80287e08 r7:dfc89e60 r6:8494e880 r5:84231800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfcedfb0 to 0xdfcedff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8492cc80
INFO: task kworker/0:24:3163 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   d9881000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:25:3165 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:25    state:D stack:0     pid:3165  tgid:3165  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfcf9d84 r8:00000002 r7:60000013 r6:dfcf9d8c r5:8409d400
 r4:8409d400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8409d400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d7400
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8409d400 r7:00000000 r6:83018000 r5:00001000 r4:7f011000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa25000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853e7b8c r4:853e7800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:853e7b8c r4:84b14700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8409d400 r8:84b1472c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84b14700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b14700 r8:80287e08 r7:dfc89e60 r6:8494ef80 r5:8409d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfcf9fb0 to 0xdfcf9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8492c100
INFO: task kworker/0:25:3165 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   d9bc9000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:26:3167 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:26    state:D stack:0     pid:3167  tgid:3167  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfd39d84 r8:00000002 r7:60000113 r6:dfd39d8c r5:84098000
 r4:84098000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84098000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd39e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b2cc0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84098000 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbb5000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8564278c r4:85642400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8564278c r4:84b14900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84098000 r8:84b1492c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84b14900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b14900 r8:80287e08 r7:dfc89e60 r6:8494ea00 r5:84098000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfd39fb0 to 0xdfd39ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8462d7c0
INFO: task kworker/0:26:3167 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   d9bc9000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:5:3171 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:5     state:D stack:0     pid:3171  tgid:3171  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfd7dd84 r8:00000002 r7:60000113 r6:dfd7dd8c r5:8409e000
 r4:8409e000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8409e000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd7de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a03c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8409e000 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df849000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855c038c r4:855c0000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:855c038c r4:8494eb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8409e000 r8:8494ebac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8494eb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8494eb80 r8:80287e08 r7:e043de60 r6:8494ec80 r5:8409e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfd7dfb0 to 0xdfd7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849de580
INFO: task kworker/1:5:3171 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   d9bc9000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:27:3172 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:27    state:D stack:0     pid:3172  tgid:3172  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfd51d84 r8:00000002 r7:60000013 r6:dfd51d8c r5:8409b000
 r4:8409b000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8409b000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd51e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c55e80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8409b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:edab1000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85d33f8c r4:85d33c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85d33f8c r4:84b14980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8409b000 r8:84b149ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84b14980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b14980 r8:80287e08 r7:dfc89e60 r6:8494ee00 r5:8409b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfd51fb0 to 0xdfd51ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8496c380
INFO: task kworker/0:27:3172 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   da067000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:6:3174 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:6     state:D stack:0     pid:3174  tgid:3174  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfda1d84 r8:00000002 r7:60000113 r6:dfda1d8c r5:8409ec00
 r4:8409ec00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8409ec00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfda1e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:840c3d40
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8409ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df969000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856bef8c r4:856bec00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856bef8c r4:8494ef00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8409ec00 r8:8494ef2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8494ef00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8494ef00 r8:80287e08 r7:e043de60 r6:8494ed80 r5:8409ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfda1fb0 to 0xdfda1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84b2f2c0
INFO: task kworker/1:6:3174 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   da4b0000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:7:3176 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:7     state:D stack:0     pid:3176  tgid:3176  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfd85d84 r8:00000002 r7:60000113 r6:dfd85d8c r5:84233000
 r4:84233000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84233000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd85e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a25ec0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84233000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaee3000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856bd38c r4:856bd000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856bd38c r4:8494ea80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84233000 r8:8494eaac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8494ea80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8494ea80 r8:80287e08 r7:e043de60 r6:83ae4980 r5:84233000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfd85fb0 to 0xdfd85ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84b2f1c0
INFO: task kworker/1:7:3176 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   da7a9000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:8:3179 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:8     state:D stack:0     pid:3179  tgid:3179  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfb9dd84 r8:00000002 r7:60000113 r6:dfb9dd8c r5:840a2400
 r4:840a2400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:840a2400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85342f80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:840a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e04ff000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856e178c r4:856e1400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856e178c r4:830cc380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:840a2400 r8:830cc3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:830cc380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:830cc380 r8:80287e08 r7:e043de60 r6:830cc280 r5:840a2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb9dfb0 to 0xdfb9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84b2f740
INFO: task kworker/1:8:3179 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   daaf8000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:9:3180 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:9     state:D stack:0     pid:3180  tgid:3180  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfc1dd84 r8:00000002 r7:60000113 r6:dfc1dd8c r5:840a6c00
 r4:840a6c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:840a6c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc1de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519f240
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:840a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfdf9000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85749b8c r4:85749800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85749b8c r4:830cc100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:840a6c00 r8:830cc12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:830cc100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:830cc100 r8:80287e08 r7:dfb9de60 r6:830cc080 r5:840a6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc1dfb0 to 0xdfc1dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84b2f840
INFO: task kworker/1:9:3180 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   daf0a000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:10:3184 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:10    state:D stack:0     pid:3184  tgid:3184  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfde1d84 r8:00000002 r7:60000113 r6:dfde1d8c r5:840a3000
 r4:840a3000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:840a3000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfde1e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847aefc0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:840a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb9d7000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8573b38c r4:8573b000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8573b38c r4:8329e600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:840a3000 r8:8329e62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8329e600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8329e600 r8:80287e08 r7:dfc1de60 r6:8329e480 r5:840a3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfde1fb0 to 0xdfde1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84b2fd80
INFO: task kworker/1:10:3184 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   daf0a000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:11:3186 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:11    state:D stack:0     pid:3186  tgid:3186  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfe41d84 r8:00000002 r7:60000113 r6:dfe41d8c r5:840a0c00
 r4:840a0c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:840a0c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe41e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518fd00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:840a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd9d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8575378c r4:85753400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8575378c r4:833abb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:840a0c00 r8:833abbac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:833abb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833abb80 r8:80287e08 r7:dfc1de60 r6:83387480 r5:840a0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe41fb0 to 0xdfe41ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84b2fc40
INFO: task kworker/1:11:3186 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   db1af000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:12:3187 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:12    state:D stack:0     pid:3187  tgid:3187  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfe01d84 r8:00000002 r7:60000113 r6:dfe01d8c r5:840a6000
 r4:840a6000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:840a6000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe01e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586f080
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:840a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ecc5d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856e378c r4:856e3400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856e378c r4:8329e000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:840a6000 r8:8329e02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8329e000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8329e000 r8:80287e08 r7:dfe41e60 r6:830cc300 r5:840a6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe01fb0 to 0xdfe01ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84b2f640
INFO: task kworker/1:12:3187 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   db5aa000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:13:3188 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:13    state:D stack:0     pid:3188  tgid:3188  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfe7dd84 r8:00000002 r7:60000113 r6:dfe7dd8c r5:840a0000
 r4:840a0000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:840a0000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe7de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c0cc0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:840a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaabb000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8581178c r4:85811400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8581178c r4:843caf80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:840a0000 r8:843cafac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:843caf80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:843caf80 r8:80287e08 r7:dfe01e60 r6:84638400 r5:840a0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe7dfb0 to 0xdfe7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84b2ff80
INFO: task kworker/1:13:3188 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   db8d1000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:14:3191 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:14    state:D stack:0     pid:3191  tgid:3191  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfe61d84 r8:00000002 r7:60000113 r6:dfe61d8c r5:840a5400
 r4:840a5400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:840a5400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe61e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858818c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:840a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc59000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8459138c r4:84591000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8459138c r4:84b12080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:840a5400 r8:84b120ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84b12080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b12080 r8:80287e08 r7:dfe01e60 r6:84b12100 r5:840a5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe61fb0 to 0xdfe61ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84b2f580
INFO: task kworker/1:14:3191 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   dbb0d000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:15:3192 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:15    state:D stack:0     pid:3192  tgid:3192  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfec1d84 r8:00000002 r7:60000113 r6:dfec1d8c r5:840ae000
 r4:840ae000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:840ae000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfec1e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881dc0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:840ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ecd2f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856e3b8c r4:856e3800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856e3b8c r4:84b12000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:840ae000 r8:84b1202c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84b12000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b12000 r8:80287e08 r7:dfe61e60 r6:84b14800 r5:840ae000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfec1fb0 to 0xdfec1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849dee40
INFO: task kworker/1:15:3192 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   dbf78000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:16:3195 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:16    state:D stack:0     pid:3195  tgid:3195  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dff05d84 r8:00000002 r7:60000113 r6:dff05d8c r5:840ad400
 r4:840ad400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:840ad400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff05e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c599c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:840ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca2f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8459478c r4:84594400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8459478c r4:84b12180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:840ad400 r8:84b121ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84b12180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b12180 r8:80287e08 r7:dfec1e60 r6:84b14a00 r5:840ad400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff05fb0 to 0xdff05ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849df200
INFO: task kworker/1:16:3195 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   dc2f8000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:17:3196 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:17    state:D stack:0     pid:3196  tgid:3196  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dff0dd84 r8:00000002 r7:60000113 r6:dff0dd8c r5:83238c00
 r4:83238c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83238c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff0de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d4a00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83238c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec743000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:859ed78c r4:859ed400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:859ed78c r4:84b12400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83238c00 r8:84b1242c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84b12400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b12400 r8:80287e08 r7:dff05e60 r6:84b14a80 r5:83238c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff0dfb0 to 0xdff0dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849df080
INFO: task kworker/1:17:3196 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   dc2f8000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:18:3198 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:18    state:D stack:0     pid:3198  tgid:3198  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dff2dd84 r8:00000002 r7:60000113 r6:dff2dd8c r5:84790c00
 r4:84790c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84790c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff2de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d4640
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84790c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec5cd000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:859ecf8c r4:859ecc00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:859ecf8c r4:84b12280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84790c00 r8:84b122ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84b12280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b12280 r8:80287e08 r7:dff05e60 r6:84b14b00 r5:84790c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff2dfb0 to 0xdff2dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849df100
INFO: task kworker/1:18:3198 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   dc632000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:19:3200 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:19    state:D stack:0     pid:3200  tgid:3200  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dff55d84 r8:00000002 r7:60000113 r6:dff55d8c r5:84790000
 r4:84790000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84790000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff55e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b6a40
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84790000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb10f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84591b8c r4:84591800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84591b8c r4:84b12480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84790000 r8:84b124ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84b12480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b12480 r8:80287e08 r7:dff05e60 r6:84b14b80 r5:84790000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff55fb0 to 0xdff55ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849df480
INFO: task kworker/1:19:3200 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   dc632000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:20:3202 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:20    state:D stack:0     pid:3202  tgid:3202  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dff79d84 r8:00000002 r7:60000113 r6:dff79d8c r5:84791800
 r4:84791800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84791800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff79e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858c1000
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84791800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb905000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:859f5f8c r4:859f5c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:859f5f8c r4:84b12380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84791800 r8:84b123ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84b12380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b12380 r8:80287e08 r7:dff05e60 r6:84b14c00 r5:84791800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff79fb0 to 0xdff79ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849df200
INFO: task kworker/1:20:3202 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   dcd62000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:21:3204 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:21    state:D stack:0     pid:3204  tgid:3204  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dff9dd84 r8:00000002 r7:60000113 r6:dff9dd8c r5:84792400
 r4:84792400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84792400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff9de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858fbd00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84792400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebc35000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85a0438c r4:85a04000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85a0438c r4:84b12200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84792400 r8:84b1222c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84b12200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b12200 r8:80287e08 r7:dff05e60 r6:84b14c80 r5:84792400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff9dfb0 to 0xdff9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849df840
INFO: task kworker/1:21:3204 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   dcd62000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:22:3206 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:22    state:D stack:0     pid:3206  tgid:3206  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dffc1d84 r8:00000002 r7:60000113 r6:dffc1d8c r5:84793000
 r4:84793000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84793000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffc1e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ee6c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84793000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec739000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85a0d78c r4:85a0d400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85a0d78c r4:84b12300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84793000 r8:84b1232c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84b12300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b12300 r8:80287e08 r7:dff05e60 r6:84b14d00 r5:84793000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffc1fb0 to 0xdffc1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849df200
INFO: task kworker/1:22:3206 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   dd2df000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:23:3209 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:23    state:D stack:0     pid:3209  tgid:3209  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dffe9d84 r8:00000002 r7:60000113 r6:dffe9d8c r5:84793c00
 r4:84793c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84793c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffe9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f7640
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84793c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff95000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85a1238c r4:85a12000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85a1238c r4:84b12500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84793c00 r8:84b1252c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84b12500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b12500 r8:80287e08 r7:dff05e60 r6:84b14d80 r5:84793c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe9fb0 to 0xdffe9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849df840
INFO: task kworker/1:23:3209 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   dd2df000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:24:3210 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:24    state:D stack:0     pid:3210  tgid:3210  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0009d84 r8:00000002 r7:60000113 r6:e0009d8c r5:84794800
 r4:84794800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84794800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0009e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aad840
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84794800 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfee1000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85a65b8c r4:85a65800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85a65b8c r4:84b12580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84794800 r8:84b125ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84b12580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b12580 r8:80287e08 r7:dff05e60 r6:84b14e00 r5:84794800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0009fb0 to 0xe0009ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849df740
INFO: task kworker/1:24:3210 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   dd713000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:25:3212 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:25    state:D stack:0     pid:3212  tgid:3212  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e002dd84 r8:00000002 r7:60000113 r6:e002dd8c r5:84795400
 r4:84795400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84795400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e002de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b500c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84795400 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ecba7000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85a66b8c r4:85a66800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85a66b8c r4:84b12600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84795400 r8:84b1262c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84b12600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b12600 r8:80287e08 r7:dff05e60 r6:84b14e80 r5:84795400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe002dfb0 to 0xe002dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849df840
INFO: task kworker/1:25:3212 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   dd713000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:26:3214 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:26    state:D stack:0     pid:3214  tgid:3214  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e004dd84 r8:00000002 r7:60000113 r6:e004dd8c r5:84796000
 r4:84796000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84796000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e004de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b4e2c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84796000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ecf27000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84593f8c r4:84593c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84593f8c r4:84b12680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84796000 r8:84b126ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84b12680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b12680 r8:80287e08 r7:dff05e60 r6:84b14f00 r5:84796000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe004dfb0 to 0xe004dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849dfe00
INFO: task kworker/1:26:3214 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   ddcab000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:27:3216 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:27    state:D stack:0     pid:3216  tgid:3216  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0059d84 r8:00000002 r7:60000013 r6:e0059d8c r5:84796c00
 r4:84796c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84796c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0059e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b51c80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84796c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0025000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85b3578c r4:85b35400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85b3578c r4:84b12700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84796c00 r8:84b1272c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84b12700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b12700 r8:80287e08 r7:dff05e60 r6:84b14f80 r5:84796c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0059fb0 to 0xe0059ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849dfec0
INFO: task kworker/1:27:3216 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   de025000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:28:3218 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:28    state:D stack:0     pid:3218  tgid:3218  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0085d84 r8:00000002 r7:60000113 r6:e0085d8c r5:84ae0000
 r4:84ae0000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ae0000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0085e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c66ec0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ae0000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed937000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85bcf78c r4:85bcf400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85bcf78c r4:84b12980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ae0000 r8:84b129ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84b12980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b12980 r8:80287e08 r7:dff05e60 r6:84b14880 r5:84ae0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0085fb0 to 0xe0085ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849de780
INFO: task kworker/1:28:3218 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   de2e0000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:29:3220 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:29    state:D stack:0     pid:3220  tgid:3220  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e00bdd84 r8:00000002 r7:60000113 r6:e00bdd8c r5:84ae1800
 r4:84ae1800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ae1800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00bde08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b78ac0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ae1800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ece55000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85bceb8c r4:85bce800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85bceb8c r4:84b12780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ae1800 r8:84b127ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84b12780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b12780 r8:80287e08 r7:dff05e60 r6:830b8480 r5:84ae1800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00bdfb0 to 0xe00bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849df680
INFO: task kworker/1:29:3220 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   de614000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:30:3222 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:30    state:D stack:0     pid:3222  tgid:3222  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e00cdd84 r8:00000002 r7:60000113 r6:e00cdd8c r5:84ae2400
 r4:84ae2400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ae2400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00cde08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cc2ec0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ae2400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed04d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85bcfb8c r4:85bcf800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85bcfb8c r4:84b12900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ae2400 r8:84b1292c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84b12900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b12900 r8:80287e08 r7:dff05e60 r6:83d43680 r5:84ae2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00cdfb0 to 0xe00cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8496f240
INFO: task kworker/1:30:3222 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   de94a000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:31:3224 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:31    state:D stack:0     pid:3224  tgid:3224  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e00d5d84 r8:00000002 r7:60000113 r6:e00d5d8c r5:84ae3000
 r4:84ae3000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ae3000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00d5e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8628b740
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ae3000 r7:00000000 r6:83018200 r5:00001000 r4:7f1a5000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eea0b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85bef78c r4:85bef400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85bef78c r4:84b12a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ae3000 r8:84b12a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84b12a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b12a00 r8:80287e08 r7:dff05e60 r6:8496b000 r5:84ae3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00d5fb0 to 0xe00d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8496f180
INFO: task kworker/1:31:3224 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   decbf000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:32:3226 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:32    state:D stack:0     pid:3226  tgid:3226  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0431d84 r8:00000002 r7:60000113 r6:e0431d8c r5:84ae4800
 r4:84ae4800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ae4800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0431e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d6f080
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ae4800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebb31000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85d43f8c r4:85d43c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85d43f8c r4:84b12a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ae4800 r8:84b12aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84b12a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b12a80 r8:80287e08 r7:e00d5e60 r6:8496b080 r5:84ae4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0431fb0 to 0xe0431ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8496f480
INFO: task kworker/1:32:3226 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   decbf000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:33:3229 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:33    state:D stack:0     pid:3229  tgid:3229  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0439d84 r8:00000002 r7:60000113 r6:e0439d8c r5:84ae5400
 r4:84ae5400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ae5400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0439e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8496fe40
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ae5400 r7:00000000 r6:83018200 r5:00001000 r4:7f139000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed87f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85bee38c r4:85bee000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85bee38c r4:84b12b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ae5400 r8:84b12b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84b12b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b12b00 r8:80287e08 r7:e00d5e60 r6:8496b100 r5:84ae5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0439fb0 to 0xe0439ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8496f440
INFO: task kworker/1:33:3229 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   def0b000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:34:3230 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:34    state:D stack:0     pid:3230  tgid:3230  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0471d84 r8:00000002 r7:60000113 r6:e0471d8c r5:84ae6000
 r4:84ae6000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ae6000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0471e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fe9dc0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ae6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:edfc9000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85d6378c r4:85d63400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85d6378c r4:84b12c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ae6000 r8:84b12c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84b12c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b12c00 r8:80287e08 r7:e0439e60 r6:8496b180 r5:84ae6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0471fb0 to 0xe0471ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8496f440
INFO: task kworker/1:34:3230 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   df465000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:35:3232 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:35    state:D stack:0     pid:3232  tgid:3232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0499d84 r8:00000002 r7:60000113 r6:e0499d8c r5:84ae3c00
 r4:84ae3c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ae3c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0499e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8628b780
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ae3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f1a3000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ee9ef000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85befb8c r4:85bef800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85befb8c r4:84b12b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ae3c00 r8:84b12bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84b12b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b12b80 r8:80287e08 r7:e0439e60 r6:8496b200 r5:84ae3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0499fb0 to 0xe0499ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8496f440
INFO: task kworker/1:35:3232 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   df465000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:36:3234 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:36    state:D stack:0     pid:3234  tgid:3234  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e04a9d84 r8:00000002 r7:60000113 r6:e04a9d8c r5:84ae6c00
 r4:84ae6c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ae6c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04a9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8628b640
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ae6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f1a1000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ee9d3000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85bef38c r4:85bef000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85bef38c r4:84b12c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ae6c00 r8:84b12cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84b12c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b12c80 r8:80287e08 r7:e0439e60 r6:8496b280 r5:84ae6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04a9fb0 to 0xe04a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8496fa80
INFO: task kworker/1:36:3234 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   df6f2000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:37:3236 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:37    state:D stack:0     pid:3236  tgid:3236  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0055d84 r8:00000002 r7:60000113 r6:e0055d8c r5:84510c00
 r4:84510c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84510c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0055e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:862a4a00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84510c00 r7:00000000 r6:83018200 r5:00001000 r4:7f179000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ee751000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85becf8c r4:85becc00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85becf8c r4:84b12d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84510c00 r8:84b12d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84b12d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b12d00 r8:80287e08 r7:e0439e60 r6:84b12e00 r5:84510c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0055fb0 to 0xe0055ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8496fbc0
INFO: task kworker/1:37:3236 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   df6f2000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:38:3238 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:38    state:D stack:0     pid:3238  tgid:3238  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e04add84 r8:00000002 r7:60000113 r6:e04add8c r5:84511800
 r4:84511800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84511800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04ade08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:862a4b80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84511800 r7:00000000 r6:83018200 r5:00001000 r4:7f177000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ee735000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85bee78c r4:85bee400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85bee78c r4:84b12e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84511800 r8:84b12eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84b12e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b12e80 r8:80287e08 r7:e0439e60 r6:84b12f80 r5:84511800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04adfb0 to 0xe04adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8496fbc0
INFO: task kworker/1:38:3238 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   dfdb1000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:39:3240 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:39    state:D stack:0     pid:3240  tgid:3240  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e04e9d84 r8:00000002 r7:60000113 r6:e04e9d8c r5:84512400
 r4:84512400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84512400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04e9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:862a49c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84512400 r7:00000000 r6:83018200 r5:00001000 r4:7f16f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ee6c1000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85bed78c r4:85bed400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85bed78c r4:84b12d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84512400 r8:84b12dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84b12d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b12d80 r8:80287e08 r7:e0439e60 r6:84b12f00 r5:84512400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04e9fb0 to 0xe04e9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8496fd00
INFO: task kworker/1:39:3240 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   dfdb1000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:40:3243 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:40    state:D stack:0     pid:3243  tgid:3243  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e050dd84 r8:00000002 r7:60000113 r6:e050dd8c r5:84513000
 r4:84513000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84513000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e050de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8496fc00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84513000 r7:00000000 r6:83018200 r5:00001000 r4:7f13d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebd3f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85beef8c r4:85beec00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85beef8c r4:8495c000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84513000 r8:8495c02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8495c000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8495c000 r8:80287e08 r7:e0439e60 r6:8495c080 r5:84513000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe050dfb0 to 0xe050dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8496ff40
INFO: task kworker/1:40:3243 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   e0226000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:41:3244 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:41    state:D stack:0     pid:3244  tgid:3244  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfe85d84 r8:00000002 r7:60000113 r6:dfe85d8c r5:84513c00
 r4:84513c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84513c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe85e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8496fc40
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84513c00 r7:00000000 r6:83018200 r5:00001000 r4:7f13b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed985000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85beeb8c r4:85bee800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85beeb8c r4:8495c100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84513c00 r8:8495c12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8495c100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8495c100 r8:80287e08 r7:e0439e60 r6:8495c180 r5:84513c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe85fb0 to 0xdfe85ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8496ff40
INFO: task kworker/1:41:3244 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   e02c3000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:42:3247 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:42    state:D stack:0     pid:3247  tgid:3247  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e058dd84 r8:00000002 r7:60000113 r6:e058dd8c r5:84515400
 r4:84515400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84515400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e058de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8614d600
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84515400 r7:00000000 r6:83018200 r5:00001000 r4:7f137000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed6f3000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85bedb8c r4:85bed800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85bedb8c r4:8495c200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84515400 r8:8495c22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8495c200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8495c200 r8:80287e08 r7:e0439e60 r6:8495c300 r5:84515400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe058dfb0 to 0xe058dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a41140
INFO: task kworker/1:42:3247 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   e0771000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:43:3248 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:43    state:D stack:0     pid:3248  tgid:3248  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e05a5d84 r8:00000002 r7:60000113 r6:e05a5d8c r5:84516000
 r4:84516000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84516000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05a5e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:862a4940
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84516000 r7:00000000 r6:83018200 r5:00001000 r4:7f16d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ee6a5000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85bedf8c r4:85bedc00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85bedf8c r4:8495c400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84516000 r8:8495c42c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8495c400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8495c400 r8:80287e08 r7:e058de60 r6:8495c480 r5:84516000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05a5fb0 to 0xe05a5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a41040
INFO: task kworker/1:43:3248 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   e0771000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:44:3250 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:44    state:D stack:0     pid:3250  tgid:3250  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e05cdd84 r8:00000002 r7:60000113 r6:e05cdd8c r5:84514800
 r4:84514800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84514800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05cde08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8614dbc0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84514800 r7:00000000 r6:83018200 r5:00001000 r4:7f135000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed593000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85bed38c r4:85bed000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85bed38c r4:8495c380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84514800 r8:8495c3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8495c380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8495c380 r8:80287e08 r7:e05a5e60 r6:8495c580 r5:84514800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05cdfb0 to 0xe05cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a41140
INFO: task kworker/1:44:3250 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   e096f000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:45:3253 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:45    state:D stack:0     pid:3253  tgid:3253  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df9e5d84 r8:00000002 r7:60000113 r6:df9e5d8c r5:84510000
 r4:84510000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84510000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e5e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8614ddc0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84510000 r7:00000000 r6:83018200 r5:00001000 r4:7f133000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec745000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85becb8c r4:85bec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85becb8c r4:8495c700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84510000 r8:8495c72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8495c700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8495c700 r8:80287e08 r7:e05a5e60 r6:8495c780 r5:84510000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9e5fb0 to 0xdf9e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a41980
INFO: task kworker/1:45:3253 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   e0cf0000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:46:3256 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:46    state:D stack:0     pid:3256  tgid:3256  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df9c9d84 r8:00000002 r7:60000013 r6:df9c9d8c r5:84516c00
 r4:84516c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84516c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86389840
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84516c00 r7:00000000 r6:83018200 r5:00001000 r4:7f133000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e04b1000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85bec38c r4:85bec000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85bec38c r4:8495c800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84516c00 r8:8495c82c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8495c800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8495c800 r8:80287e08 r7:e05a5e60 r6:8495c880 r5:84516c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9c9fb0 to 0xdf9c9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a41540
INFO: task kworker/1:46:3256 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   e14d1000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:47:3258 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:47    state:D stack:0     pid:3258  tgid:3258  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa05d84 r8:00000002 r7:60000113 r6:dfa05d8c r5:840a4800
 r4:840a4800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:840a4800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:869d20c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:840a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f267000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eeab1000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8653b38c r4:8653b000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8653b38c r4:8495c980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:840a4800 r8:8495c9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8495c980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8495c980 r8:80287e08 r7:df9c9e60 r6:8495ca00 r5:840a4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa05fb0 to 0xdfa05ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a41c80
INFO: task kworker/1:47:3258 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   e14d1000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:48:3260 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:48    state:D stack:0     pid:3260  tgid:3260  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa11d84 r8:00000002 r7:60000113 r6:dfa11d8c r5:848e8000
 r4:848e8000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:848e8000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8496c9c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f265000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ee995000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8653af8c r4:8653ac00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8653af8c r4:8495c680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e8000 r8:8495c6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8495c680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8495c680 r8:80287e08 r7:dfa05e60 r6:8495ca80 r5:848e8000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa11fb0 to 0xdfa11ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a41b00
INFO: task kworker/1:48:3260 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   e14d1000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:49:3262 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:49    state:D stack:0     pid:3262  tgid:3262  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa59d84 r8:00000002 r7:60000013 r6:dfa59d8c r5:848e8c00
 r4:848e8c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:848e8c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849de580
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f261000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eda29000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8653a78c r4:8653a400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8653a78c r4:8495cb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e8c00 r8:8495cb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8495cb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8495cb00 r8:80287e08 r7:dfa11e60 r6:8495cb80 r5:848e8c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa59fb0 to 0xdfa59ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a416c0
INFO: task kworker/1:49:3262 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   e14d1000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:50:3264 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:50    state:D stack:0     pid:3264  tgid:3264  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa81d84 r8:00000002 r7:60000113 r6:dfa81d8c r5:848e9800
 r4:848e9800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:848e9800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a41740
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f263000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:edacd000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8653ab8c r4:8653a800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8653ab8c r4:8495cc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848e9800 r8:8495ccac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8495cc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8495cc80 r8:80287e08 r7:dfa59e60 r6:8495c500 r5:848e9800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa81fb0 to 0xdfa81ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8496ff40
INFO: task kworker/1:50:3264 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   e1f5c000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:51:3266 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:51    state:D stack:0     pid:3266  tgid:3266  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:e0561d84 r8:00000002 r7:60000113 r6:e0561d8c r5:848eb000
 r4:848eb000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:848eb000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0561e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86885d80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f311000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:edbc3000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:86b7978c r4:86b79400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:86b7978c r4:8495cd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848eb000 r8:8495cd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8495cd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8495cd00 r8:80287e08 r7:dfa59e60 r6:8495cd80 r5:848eb000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0561fb0 to 0xe0561ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a41ec0
INFO: task kworker/1:51:3266 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   e1f5c000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:52:3267 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:52    state:D stack:0     pid:3267  tgid:3267  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:848ea400
 r4:848ea400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:848ea400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:866ea180
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:848ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f271000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eeb91000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8654038c r4:86540000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8654038c r4:8495cc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:848ea400 r8:8495cc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8495cc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8495cc00 r8:80287e08 r7:e0561e60 r6:8495c900 r5:848ea400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfaf9fb0 to 0xdfaf9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a41b00
INFO: task kworker/1:52:3267 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   e21b3000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:28:3269 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:28    state:D stack:0     pid:3269  tgid:3269  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa8dd84 r8:00000002 r7:60000113 r6:dfa8dd8c r5:840abc00
 r4:840abc00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:840abc00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c6f580
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:840abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ede3d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85d3978c r4:85d39400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85d3978c r4:8496b380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:840abc00 r8:8496b3ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8496b380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8496b380 r8:80287e08 r7:dfc89e60 r6:8496b400 r5:840abc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa8dfb0 to 0xdfa8dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84afb700
INFO: task kworker/0:28:3269 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   e21b3000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:53:3271 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:53    state:D stack:0     pid:3271  tgid:3271  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfb39d84 r8:00000002 r7:60000113 r6:dfb39d8c r5:84ae0c00
 r4:84ae0c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ae0c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb39e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86da7540
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ae0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f33d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ee417000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8654138c r4:86541000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8654138c r4:8495ce80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ae0c00 r8:8495ceac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8495ce80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8495ce80 r8:80287e08 r7:e0561e60 r6:8496b480 r5:84ae0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb39fb0 to 0xdfb39ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a703c0
INFO: task kworker/1:53:3271 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   e25ff000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:54:3274 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:54    state:D stack:0     pid:3274  tgid:3274  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfb6dd84 r8:00000002 r7:60000013 r6:dfb6dd8c r5:84878c00
 r4:84878c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84878c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb6de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849e7280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84878c00 r7:00000000 r6:83018200 r5:00001000 r4:7f50d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:f10f7000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8459f78c r4:8459f400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8459f78c r4:8495cf00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84878c00 r8:8495cf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8495cf00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8495cf00 r8:80287e08 r7:dfb39e60 r6:8496b580 r5:84878c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb6dfb0 to 0xdfb6dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a705c0
INFO: task kworker/1:54:3274 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   e2acb000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:55:3276 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:55    state:D stack:0     pid:3276  tgid:3276  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfba1d84 r8:00000002 r7:60000113 r6:dfba1d8c r5:84878000
 r4:84878000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84878000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba1e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:871312c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84878000 r7:00000000 r6:83018200 r5:00001000 r4:7f40d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eee13000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:86541f8c r4:86541c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:86541f8c r4:8495cf80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84878000 r8:8495cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8495cf80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8495cf80 r8:80287e08 r7:dfb6de60 r6:8496b600 r5:84878000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfba1fb0 to 0xdfba1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a706c0
INFO: task kworker/1:55:3276 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   e2e4c000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:56:3277 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:56    state:D stack:0     pid:3277  tgid:3277  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfba5d84 r8:00000002 r7:60000013 r6:dfba5d8c r5:8487a400
 r4:8487a400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8487a400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8496c480
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8487a400 r7:00000000 r6:83018200 r5:00001000 r4:7f50b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:f0f8b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8459fb8c r4:8459f800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8459fb8c r4:8329e380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8487a400 r8:8329e3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8329e380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8329e380 r8:80287e08 r7:dfba1e60 r6:8496b680 r5:8487a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfba5fb0 to 0xdfba5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a707c0
INFO: task kworker/1:56:3277 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   e2e4c000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:57:3279 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:57    state:D stack:0     pid:3279  tgid:3279  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfbadd84 r8:00000002 r7:60000013 r6:dfbadd8c r5:8487bc00
 r4:8487bc00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8487bc00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbade08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847aa200
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8487bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f509000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:f0f2b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8459f38c r4:8459f000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8459f38c r4:8495ce00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8487bc00 r8:8495ce2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8495ce00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8495ce00 r8:80287e08 r7:dfba1e60 r6:8496b700 r5:8487bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbadfb0 to 0xdfbadff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a70940
INFO: task kworker/1:57:3279 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:58    state:D stack:0     pid:3281  tgid:3281  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfc21d84 r8:00000002 r7:60000113 r6:dfc21d8c r5:8487b000
 r4:8487b000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8487b000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc21e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847aa700
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f507000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:f0eeb000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8459ff8c r4:8459fc00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8459ff8c r4:84638f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8487b000 r8:84638f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84638f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84638f00 r8:80287e08 r7:dfba1e60 r6:8496b780 r5:8487b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc21fb0 to 0xdfc21ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a70480
INFO: task kworker/1:58:3281 is blocked on a mutex likely owned by task kworker/0:87:4232.
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   e3525000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
 r4:ea97ddc0
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc29e08
 r5:00001000 r4:f0e8b000
 r5:8484478c r4:84844400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xdfc29fb0 to 0xdfc29ff8)
task:kworker/0:87    state:R  running task     stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Exception stack(0xea97dd28 to 0xea97dd70)
dd20:                   e38ed000 edec9000 00000001 80239b98 7f0bb000 00000001
dd40: 82ac15a0 7f0bb000 edec9000 8280c928 82ac21c4 ea97dda4 ea97dda8 ea97dd78
dd60: 80230ad0 80239bb0 80000113 ffffffff
 r5:80000113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea97ddc0 r5:ea97de08
 r4:ea97ddc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0aa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8516d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851ecb8c r4:851ec800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:851ecb8c r4:847b4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b4e80 r8:80287e08 r7:eb1b5e60 r6:84991c80 r5:8516d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a0a600
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:60:3285 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:60    state:D stack:0     pid:3285  tgid:3285  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfc39d84 r8:00000002 r7:60000113 r6:dfc39d8c r5:8487e000
 r4:8487e000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8487e000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc39e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
 r9:83018205 r8:8487e000 r7:00000000 r6:83018200 r5:00001000 r4:7f431000
 r5:870ac78c r4:870ac400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:8487e000 r8:8493f0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:82ac21c4 r9:8516d400 r8:80200be4 r7:ea97dd5c r6:ffffffff r5:8516d400
 r4:82ac21e4
 r4:00000000
 r5:00001000 r4:e069b000
 r10:61c88647 r9:8516d400 r8:847b4eac r7:82804d40 r6:dddced80 r5:dddceda0
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfc85d84 r8:00000002 r7:60000013 r6:dfc85d8c r5:8487c800
 r4:8487c800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8487c800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc85e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_

<<cut 9695932 bytes out>>

8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85b35b8c r4:85b35800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   b0d55000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:876:6814 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:876   state:D stack:0     pid:6814  tgid:6814  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebd4dd84 r8:00000002 r7:60000113 r6:ebd4dd8c r5:85bad400
 r4:85bad400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85bad400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd4de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d6380
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85bad400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebc0b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85b3538c r4:85b35000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b3538c r4:85ad3700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85bad400 r8:85ad372c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85ad3700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85ad3700 r8:80287e08 r7:ebd49e60 r6:85b62b00 r5:85bad400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd4dfb0 to 0xebd4dff8)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r5:85baec00 r4:8291a680
 r4:00000000
 r4:00000000
 r5:00001000 r4:ecc4d000
 r5:85b3478c r4:85b34400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:85baec00 r8:85ad352c r7:82804d40 r6:dddced80 r5:dddceda0
5fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xea979d28 to 0xea979d70)
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:949:6818 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:949   state:D stack:0     pid:6818  tgid:6818  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ecd59d84 r8:00000002 r7:60000113 r6:ecd59d8c r5:85bae000
 r4:85bae000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85bae000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd59e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f2080
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85bae000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebd51000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85bcc38c r4:85bcc000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85bcc38c r4:85b62c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85bae000 r8:85b62c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85b62c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85b62c00 r8:80287e08 r7:ed831e60 r6:85b62c80 r5:85bae000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xecd59fb0 to 0xecd59ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849dfdc0
INFO: task kworker/1:949:6818 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   b1784000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
task:kworker/1:950   state:D stack:0     pid:6820  tgid:6820  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
 r5:85bcc78c r4:85bcc400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85bcc78c r4:85b62d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:85b62d00 r8:80287e08 r7:ed831e60 r6:85b62d80 r5:85babc00
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r4:ea979dc0
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:951:6822 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:951   state:D stack:0     pid:6822  tgid:6822  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed7bdd84 r8:00000002 r7:60000013 r6:ed7bdd8c r5:85ba9800
 r4:85ba9800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85ba9800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7bde08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f2480
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85ba9800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca97000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85bccf8c r4:85bccc00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85bccf8c r4:85b62900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85ba9800 r8:85b6292c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85b62900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85b62900 r8:80287e08 r7:ecd51e60 r6:85b62e80 r5:85ba9800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed7bdfb0 to 0xed7bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:858f2100
INFO: task kworker/1:951:6822 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r5:84088000 r4:8291a680
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:85bcd38c r4:85bcd000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85bcd38c r4:85acf100
 r10:00000000 r9:85acf100 r8:80287e08 r7:ed7bde60 r6:85acf180 r5:84088000
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:84986380
INFO: task kworker/1:953:6826 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:953   state:D stack:0     pid:6826  tgid:6826  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed0fdd84 r8:00000002 r7:60000013 r6:ed0fdd8c r5:85255400
 r4:85255400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85255400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0fde08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f2580
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85255400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec9cb000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85bcd78c r4:85bcd400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85bcd78c r4:85acf000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85255400 r8:85acf02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85acf000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85acf000 r8:80287e08 r7:ed7bde60 r6:85ad3780 r5:85255400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed0fdfb0 to 0xed0fdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:858f26c0
INFO: task kworker/1:953:6826 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   b2250000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:954:6829 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:954   state:D stack:0     pid:6829  tgid:6829  ppid:2      task_flags:0x4208060 flags:0x00000000
Call trace: 
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r5:00001000 r4:ed107000
 r5:8459538c r4:84595000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:85253000 r8:85acf2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:858f29c0
INFO: task kworker/1:954:6829 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   b2677000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
Exception stack(0xea979fb0 to 0xea979ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed1d9d84 r8:00000002 r7:60000013 r6:ed1d9d8c r5:85256c00
 r4:85256c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85256c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1d9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f2b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85256c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ecb65000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:85bcdf8c r4:85bcdc00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85bcdf8c r4:85acf200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:85acf200 r8:80287e08 r7:ed1d1e60 r6:85ad3880 r5:85256c00
 r4:858f2600
Call trace: 
Exception stack(0xea979d28 to 0xea979d70)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r5:851af78c r4:851af400
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:8291a684 r9:ed1e1d84 r8:00000002 r7:60000013 r6:ed1e1d8c r5:85256000
 r4:00000000
 r4:00000000
 r5:85bcdb8c r4:85bcd800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85bcdb8c r4:85acf080
 r4:85acf080
1fa0:                                     00000000 00000000 00000000 00000000
Call trace: 
Exception stack(0xea979d28 to 0xea979d70)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r5:851af78c r4:851af400
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:878:6836 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:878   state:D stack:0     pid:6836  tgid:6836  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ecd5dd84 r8:00000002 r7:60000113 r6:ecd5dd8c r5:85253c00
 r4:85253c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85253c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd5de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab9280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85253c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebbb7000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85b36b8c r4:85b36800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b36b8c r4:85ad3980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85253c00 r8:85ad39ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85ad3980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85ad3980 r8:80287e08 r7:ebd49e60 r6:85ad3a80 r5:85253c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xecd5dfb0 to 0xecd5dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:859d6e40
INFO: task kworker/0:878:6836 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   b2981000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
 r4:00000000
 r5:851af78c r4:851af400
 r4:84992780
Exception stack(0xea979fb0 to 0xea979ff8)
 r4:84986380
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
 r5:85b35f8c r4:85b35c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b35f8c r4:85ad3a00
 r4:85ad3a00
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:859d6f40
INFO: task kworker/0:879:6837 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   b3271000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:957:6838 blocked for more than 477 seconds.
 r4:85250000
 r4:00000000
 r4:00000000
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85bce38c r4:85bce000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85bce38c r4:85acf380
 r10:61c88647 r9:85250000 r8:85acf3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:880:6840 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:880   state:D stack:0     pid:6840  tgid:6840  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed0f9d84 r8:00000002 r7:60000113 r6:ed0f9d8c r5:85254800
 r4:85254800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85254800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:85b3638c r4:85b36000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b3638c r4:85ad3c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fa0:                                     00000000 00000000 00000000 00000000
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   b36ca000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r5:00001000 r4:ed0bf000
 r5:85bce78c r4:85bce400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85bce78c r4:85acf480
 r10:61c88647 r9:85a5e000 r8:85acf4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r5:85ae6c00 r4:8291a680
 r4:00000000
 r4:00000000
 r5:85b3678c r4:85b36400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b3678c r4:85ad3d80
 r4:85ad3d80
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
Exception stack(0xea979d28 to 0xea979d70)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r5:851af78c r4:851af400
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:959:6846 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:959   state:D stack:0     pid:6846  tgid:6846  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed619d84 r8:00000002 r7:60000113 r6:ed619d8c r5:85400000
 r4:85400000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85400000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed619e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858fd0c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85400000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed155000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85bcef8c r4:85bcec00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85bcef8c r4:85acf580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85400000 r8:85acf5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85acf580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85acf580 r8:80287e08 r7:ed1d1e60 r6:85ad3e80 r5:85400000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed619fb0 to 0xed619ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:858f2880
INFO: task kworker/1:959:6846 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   b3d29000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
Exception stack(0xea979fb0 to 0xea979ff8)
INFO: task kworker/0:882:6850 blocked for more than 477 seconds.
 r5:85400c00 r4:8291a680
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85b36f8c r4:85b36c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:85ad3f80 r8:80287e08 r7:ecd5de60 r6:85ad3580 r5:85400c00
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:883:6852 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:883   state:D stack:0     pid:6852  tgid:6852  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ece15d84 r8:00000002 r7:60000113 r6:ece15d8c r5:85401800
 r4:85401800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85401800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece15e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab9180
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85401800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec63f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85b3738c r4:85b37000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b3738c r4:85ad3f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85401800 r8:85ad3f2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85ad3f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85ad3f00 r8:80287e08 r7:ecd5de60 r6:85ad3400 r5:85401800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xece15fb0 to 0xece15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85ab9140
INFO: task kworker/0:883:6852 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
Exception stack(0xea979fb0 to 0xea979ff8)
INFO: task kworker/0:884:6855 blocked for more than 477 seconds.
 r4:85402400
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
 r5:00001000 r4:ecb77000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85b3778c r4:85b37400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b3778c r4:859bcf00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85402400 r8:859bcf2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:859bcf00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:859bcf00 r8:80287e08 r7:ece15e60 r6:859bc980 r5:85402400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xece19fb0 to 0xece19ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85ab9480
INFO: task kworker/0:884:6855 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   b44a9000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c7c38c r4:85c7c000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:85acf600 r8:80287e08 r7:ed1d1e60 r6:85acf680 r5:84088c00
 r4:858fd000
Call trace: 
Exception stack(0xea979d28 to 0xea979d70)
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:8291a684 r9:ece1dd84 r8:00000002 r7:60000113 r6:ece1dd8c r5:85403000
 r4:00000000
 r4:00000000
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85b37b8c r4:85b37800
 r7:dddced80 r6:83018000 r5:85b37b8c r4:858f8f80
 r10:61c88647 r9:85403000 r8:858f8fac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:858f8f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:858f8f80 r8:80287e08 r7:ece19e60 r6:85ad3600 r5:85403000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xece1dfb0 to 0xece1dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85ab9680
INFO: task kworker/0:885:6857 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   b4cb4000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:84986380
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:85b37f8c r4:85b37c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b37f8c r4:85b6c000
 r10:61c88647 r9:85403c00 r8:85b6c02c r7:82804d40 r6:dddced80 r5:dddceda0
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
 r4:ea979dc0
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
 r5:85404800 r4:8291a680
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2ade08
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85b3c38c r4:85b3c000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:85404800 r8:85b6c1ac r7:82804d40 r6:dddced80 r5:dddceda0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85ab9780
INFO: task kworker/0:887:6862 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   b4fb5000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:888:6863 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:888   state:D stack:0     pid:6863  tgid:6863  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed355d84 r8:00000002 r7:60000113 r6:ed355d8c r5:8408a400
 r4:8408a400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8408a400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed355e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab9ac0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8408a400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ecc9f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85b3c78c r4:85b3c400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b3c78c r4:85b6c280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8408a400 r8:85b6c2ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85b6c280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85b6c280 r8:80287e08 r7:ed2ade60 r6:85acf500 r5:8408a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed355fb0 to 0xed355ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85ab9780
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r5:84089800 r4:8291a680
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:85b3cf8c r4:85b3cc00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b3cf8c r4:85b6c100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xed3c9fb0 to 0xed3c9ff8)
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:890:6867 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:890   state:D stack:0     pid:6867  tgid:6867  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed3cdd84 r8:00000002 r7:60000113 r6:ed3cdd8c r5:8408bc00
 r4:8408bc00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8408bc00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3cde08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab9c80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8408bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ecd9b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85b3cb8c r4:85b3c800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b3cb8c r4:85b6c300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8408bc00 r8:85b6c32c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85b6c300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85b6c300 r8:80287e08 r7:ed3c9e60 r6:85acf780 r5:8408bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed3cdfb0 to 0xed3cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85ab9cc0
INFO: task kworker/0:890:6867 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Call trace: 
Exception stack(0xea979d28 to 0xea979d70)
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r5:851af78c r4:851af400
 r4:84992780
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:891:6870 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:891   state:D stack:0     pid:6870  tgid:6870  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed45dd84 r8:00000002 r7:60000113 r6:ed45dd8c r5:8408e000
 r4:8408e000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8408e000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed45de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c0940
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8408e000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ecfb7000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85b3eb8c r4:85b3e800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b3eb8c r4:85b6c480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8408e000 r8:85b6c4ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85b6c480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85b6c480 r8:80287e08 r7:ed3c9e60 r6:85acf800 r5:8408e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed45dfb0 to 0xed45dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85ab9d80
INFO: task kworker/0:891:6870 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   b5b31000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r5:851af78c r4:851af400
 r4:84992780
Exception stack(0xea979fb0 to 0xea979ff8)
INFO: task kworker/0:892:6871 blocked for more than 477 seconds.
 r5:8408c800 r4:8291a680
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85b3d78c r4:85b3d400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:8408c800 r8:85b6c42c r7:82804d40 r6:dddced80 r5:dddceda0
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r5:00001000 r4:ea93d000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:893:6873 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:893   state:D stack:0     pid:6873  tgid:6873  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed3b1d84 r8:00000002 r7:60000113 r6:ed3b1d8c r5:85406000
 r4:85406000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85406000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3b1e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c0000
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85406000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ece41000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85b3d38c r4:85b3d000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b3d38c r4:85b6c580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85406000 r8:85b6c5ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85b6c580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85b6c580 r8:80287e08 r7:ed45de60 r6:85b6c600 r5:85406000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed3b1fb0 to 0xed3b1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:859c0100
INFO: task kworker/0:893:6873 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   b5f71000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
 r5:851af78c r4:851af400
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
 r5:85406c00 r4:8291a680
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:85b3db8c r4:85b3d800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b3db8c r4:85b6c500
 r10:00000000 r9:85b6c500 r8:80287e08 r7:ed45de60 r6:85b6c780 r5:85406c00
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
9d60: 80230ad0 80239bb0 80070013 ffffffff
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:851af78c r4:851af400
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018005 r8:85405400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000
 r5:85b3e38c r4:85b3e000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:85405400 r8:85b6c72c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85b6c700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85b6c700 r8:80287e08 r7:ed45de60 r6:85b6c800 r5:85405400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed46dfb0 to 0xed46dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:859c0600
INFO: task kworker/0:895:6878 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   b6268000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
INFO: task kworker/0:896:6880 blocked for more than 477 seconds.
 r4:85410000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4d9e08
 r5:00001000 r4:ecf7b000
 r5:85b3df8c r4:85b3dc00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b3df8c r4:85b6c680
 r10:61c88647 r9:85410000 r8:85b6c6ac r7:82804d40 r6:dddced80 r5:dddceda0
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
Exception stack(0xea979d28 to 0xea979d70)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r5:851af78c r4:851af400
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:84986380
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
 r5:85b3e78c r4:85b3e400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xed5e1fb0 to 0xed5e1ff8)
 r4:859c0700
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:898:6884 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:898   state:D stack:0     pid:6884  tgid:6884  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed5f9d84 r8:00000002 r7:60000113 r6:ed5f9d8c r5:85411800
 r4:85411800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85411800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5f9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b73580
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85411800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed29d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85b4878c r4:85b48400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b4878c r4:85b6ca80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85411800 r8:85b6caac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85b6ca80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85b6ca80 r8:80287e08 r7:ed45de60 r6:85b6cb00 r5:85411800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed5f9fb0 to 0xed5f9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:859c0a40
INFO: task kworker/0:898:6884 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r5:851af78c r4:851af400
 r4:84992780
Exception stack(0xea979fb0 to 0xea979ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
 r5:85412400 r4:8291a680
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85412400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed069000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85b3ef8c r4:85b3ec00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b3ef8c r4:85b6cb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85412400 r8:85b6cbac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85b6cb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85b6cb80 r8:80287e08 r7:ed5f9e60 r6:85b6cc00 r5:85412400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed61dfb0 to 0xed61dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:859c0bc0
INFO: task kworker/0:899:6886 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   b6cbe000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:900   state:D stack:0     pid:6888  tgid:6888  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed621e08
 r9:83018005 r8:85413000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000
 r5:85b3f38c r4:85b3f000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:85413000 r8:85b6c92c r7:82804d40 r6:dddced80 r5:dddceda0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r4:82ac21e4
 r4:00000000
 r5:851af78c r4:851af400
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85413c00
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed66de08
 r5:00001000 r4:ed1a9000
 r5:85b3f78c r4:85b3f400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b3f78c r4:85b6cd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85413c00 r8:85b6cdac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85b6cd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85b6cd80 r8:80287e08 r7:ed5f9e60 r6:85b6ce00 r5:85413c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed66dfb0 to 0xed66dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:859c0f40
INFO: task kworker/0:901:6890 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   b7089000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:902:6892 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:902   state:D stack:0     pid:6892  tgid:6892  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed6a5d84 r8:00000002 r7:60000013 r6:ed6a5d8c r5:85414800
 r4:85414800
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
 r5:85b3ff8c r4:85b3fc00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b3ff8c r4:85ad3280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:85ad3280 r8:80287e08 r7:ed5f9e60 r6:85ad3380 r5:85414800
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:82ac21e4
 r4:00000000
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:903:6894 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:903   state:D stack:0     pid:6894  tgid:6894  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed6c1d84 r8:00000002 r7:60000113 r6:ed6c1d8c r5:85415400
 r4:85415400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85415400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6c1e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b73000
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85415400 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed23f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85b4838c r4:85b48000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b4838c r4:85b6ca00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85415400 r8:85b6ca2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85b6ca00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85b6ca00 r8:80287e08 r7:ed5f9e60 r6:85b6cd00 r5:85415400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed6c1fb0 to 0xed6c1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85b730c0
INFO: task kworker/0:903:6894 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   b75ee000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r5:851af78c r4:851af400
 r4:84992780
Exception stack(0xea979fb0 to 0xea979ff8)
INFO: task kworker/0:904:6895 blocked for more than 477 seconds.
 r4:85416000
 r4:00000000
 r9:83018005 r8:85416000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000
 r5:85b48b8c r4:85b48800
 r7:dddced80 r6:83018000 r5:85b48b8c r4:85b6cf00
 r10:00000000 r9:85b6cf00 r8:80287e08 r7:ed5f9e60 r6:85b6cf80 r5:85416000
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:905:6898 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:905   state:D stack:0     pid:6898  tgid:6898  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed6ddd84 r8:00000002 r7:60000013 r6:ed6ddd8c r5:85416c00
 r4:85416c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85416c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6dde08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b73880
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85416c00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed35f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85b48f8c r4:85b48c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b48f8c r4:85b83080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85416c00 r8:85b830ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85b83080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85b83080 r8:80287e08 r7:ed5f9e60 r6:85b83100 r5:85416c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed6ddfb0 to 0xed6ddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85b73540
INFO: task kworker/0:905:6898 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
 r5:85c00000 r4:8291a680
 r4:00000000
 r4:00000000
 r5:85b4938c r4:85b49000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b4938c r4:85b83180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85c00000 r8:85b831ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85b83180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85b83180 r8:80287e08 r7:ed6dde60 r6:85b83200 r5:85c00000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed6f9fb0 to 0xed6f9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85b73540
INFO: task kworker/0:906:6899 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   b7f14000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
Exception stack(0xea979fb0 to 0xea979ff8)
INFO: task kworker/0:907:6902 blocked for more than 477 seconds.
 r5:85c00c00 r4:8291a680
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:85b4a78c r4:85b4a400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b4a78c r4:85b83300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85c00c00 r8:85b8332c r7:82804d40 r6:dddced80 r5:dddceda0
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:82ac21e4
 r4:ea979dc0
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:84986380
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018005 r8:85c01800 r7:00000000 r6:83018000 r5:00001000 r4:7f085000
 r5:85b49b8c r4:85b49800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:00000001
 r4:85b73700
Workqueue: events bpf_prog_free_deferred
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   b7f14000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:909:6906 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:909   state:D stack:0     pid:6906  tgid:6906  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed73dd84 r8:00000002 r7:60000113 r6:ed73dd8c r5:85c02400
 r4:85c02400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85c02400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed73de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b73b00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85c02400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed3a9000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85b4978c r4:85b49400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b4978c r4:85b83500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85c02400 r8:85b8352c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85b83500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85b83500 r8:80287e08 r7:ed715e60 r6:85b83580 r5:85c02400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed73dfb0 to 0xed73dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xea979d28 to 0xea979d70)
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
INFO: task kworker/0:910:6908 blocked for more than 477 seconds.
 r10:8291a684 r9:ed741d84 r8:00000002 r7:60000013 r6:ed741d8c r5:85c03000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed741e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b73d00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85c03000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed3dd000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85b49f8c r4:85b49c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b49f8c r4:85b83600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85c03000 r8:85b8362c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85b83600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85b83600 r8:80287e08 r7:ed715e60 r6:85b83680 r5:85c03000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed741fb0 to 0xed741ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85b73e00
INFO: task kworker/0:910:6908 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   b8321000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
 r4:84986380
task:kworker/0:911   state:D stack:0     pid:6909  tgid:6909  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed735e08
 r9:83018005 r8:85c03c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000
 r5:85b4a38c r4:85b4a000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:85c03c00 r8:85b8302c r7:82804d40 r6:dddced80 r5:dddceda0
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r4:ea979dc0
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
 r4:84992780
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r5:85c04800 r4:8291a680
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b73f00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85c04800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed4db000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85b4ab8c r4:85b4a800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b4ab8c r4:85b83280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85c04800 r8:85b832ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85b83280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85b83280 r8:80287e08 r7:ed715e60 r6:85b83800 r5:85c04800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed7c1fb0 to 0xed7c1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:858f2f80
INFO: task kworker/0:912:6911 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   b8a3e000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:913:6913 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:913   state:D stack:0     pid:6913  tgid:6913  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed7c5d84 r8:00000002 r7:60000113 r6:ed7c5d8c r5:85c05400
 r4:85c05400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85c05400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7c5e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r4:00000000
 r5:85b4af8c r4:85b4ac00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b4af8c r4:85b83880
 r10:61c88647 r9:85c05400 r8:85b838ac r7:82804d40 r6:dddced80 r5:dddceda0
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:00000000
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
 r4:00000000
 r5:851af78c r4:851af400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:84986380
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
 r5:85b4bb8c r4:85b4b800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b4bb8c r4:85b83a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85c06000 r8:85b83a2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85b83a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85b83a00 r8:80287e08 r7:ed715e60 r6:85b83a80 r5:85c06000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed7c9fb0 to 0xed7c9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85b7a3c0
INFO: task kworker/0:914:6916 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   b8e37000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:915:6917 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:915   state:D stack:0     pid:6917  tgid:6917  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed86dd84 r8:00000002 r7:60000113 r6:ed86dd8c r5:85c06c00
 r4:85c06c00
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
 r5:85b4b78c r4:85b4b400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b4b78c r4:85b83980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:85b83980 r8:80287e08 r7:ed7c9e60 r6:85b83b00 r5:85c06c00
 r4:85b7a300
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
 r4:00000001
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r5:84788000 r4:8291a680
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
 r5:00001000 r4:ed793000
 r5:85b4bf8c r4:85b4bc00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:84788000 r8:85b837ac r7:82804d40 r6:dddced80 r5:dddceda0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   b9665000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:917:6922 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:917   state:D stack:0     pid:6922  tgid:6922  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed885d84 r8:00000002 r7:60000113 r6:ed885d8c r5:84788c00
 r4:84788c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84788c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed885e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b7a740
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84788c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed7cf000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85b3fb8c r4:85b3f800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85b3fb8c r4:85b83b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84788c00 r8:85b83bac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85b83b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85b83b80 r8:80287e08 r7:ed7cde60 r6:85b83d00 r5:84788c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed885fb0 to 0xed885ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85b7a500
INFO: task kworker/0:917:6922 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
9d20:                   b9ac1000 edee7000 00000001 80239b98 7f0c9000 00000001
 r4:ea979dc0
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:918:6923 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:918   state:D stack:0     pid:6923  tgid:6923  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed89dd84 r8:00000002 r7:60000013 r6:ed89dd8c r5:84789800
 r4:84789800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84789800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed89de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b7ac80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84789800 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed903000
 r5:85c7c78c r4:85c7c400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c7c78c r4:85b83d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84789800 r8:85b83dac r7:82804d40 r6:dddced80 r5:dddceda0
dfa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
9d20:                   b9ac1000 edee7000 00000001 80239b98 7f0c9000 00000001
 r4:ea979dc0
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
 r4:84992780
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:919   state:D stack:0     pid:6926  tgid:6926  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
 r4:00000000
 r5:85b4b38c r4:85b4b000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:8478a400 r8:85b83cac r7:82804d40 r6:dddced80 r5:dddceda0
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:00000000
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:920:6928 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:920   state:D stack:0     pid:6928  tgid:6928  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed8edd84 r8:00000002 r7:60000013 r6:ed8edd8c r5:8478b000
 r4:8478b000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8478b000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed8ede08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b7ad40
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8478b000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed923000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c7cb8c r4:85c7c800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c7cb8c r4:85c4c000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8478b000 r8:85c4c02c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c4c000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c4c000 r8:80287e08 r7:ed89de60 r6:85c4c080 r5:8478b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed8edfb0 to 0xed8edff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85b7ac40
INFO: task kworker/0:920:6928 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   b9ee3000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:8291a684 r9:ed8cdd84 r8:00000002 r7:60000013 r6:ed8cdd8c r5:8478bc00
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c3b000
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8478bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed963000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c7cf8c r4:85c7cc00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c7cf8c r4:85c4c180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8478bc00 r8:85c4c1ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c4c180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c4c180 r8:80287e08 r7:ed8ede60 r6:85c4c200 r5:8478bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed8cdfb0 to 0xed8cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85b7aec0
INFO: task kworker/0:921:6929 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   ba0f7000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:922:6931 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:922   state:D stack:0     pid:6931  tgid:6931  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed92dd84 r8:00000002 r7:60000113 r6:ed92dd8c r5:8478d400
 r4:8478d400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r4:00000000
 r4:00000000
 r5:85c7db8c r4:85c7d800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c7db8c r4:85c4c100
 r10:61c88647 r9:8478d400 r8:85c4c12c r7:82804d40 r6:dddced80 r5:dddceda0
dfa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xea979d28 to 0xea979d70)
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
      Not tainted 6.15.0-rc6-syzkaller #0
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed96dd84 r8:00000002 r7:60000013 r6:ed96dd8c r5:8478ec00
 r4:8478ec00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8478ec00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed96de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c3b540
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8478ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed9a3000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c7d38c r4:85c7d000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c7d38c r4:85c4c380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8478ec00 r8:85c4c3ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c4c380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c4c380 r8:80287e08 r7:ed92de60 r6:85c4c400 r5:8478ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed96dfb0 to 0xed96dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c3b040
INFO: task kworker/0:923:6933 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   ba832000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
 r5:851af78c r4:851af400
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
      Not tainted 6.15.0-rc6-syzkaller #0
Call trace: 
 r5:8408ec00 r4:8291a680
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:85bcf38c r4:85bcf000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:8408ec00 r8:85acf9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   ba832000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:924:6938 blocked for more than 478 seconds.
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:85c7e38c r4:85c7e000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:8408b000 r8:85c4c52c r7:82804d40 r6:dddced80 r5:dddceda0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:82ac21e4
 r4:00000000
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Exception stack(0xea979fb0 to 0xea979ff8)
INFO: task kworker/0:925:6940 blocked for more than 478 seconds.
 r10:8291a684 r9:ecb81d84 r8:00000002 r7:60000113 r6:ecb81d8c r5:8408d400
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
 r9:83018005 r8:8408d400 r7:00000000 r6:83018000 r5:00001000 r4:7f047000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e88d7000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c7d78c r4:85c7d400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c7d78c r4:85c4c480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8408d400 r8:85c4c4ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c4c480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c4c480 r8:80287e08 r7:ed94de60 r6:85acfa80 r5:8408d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xecb81fb0 to 0xecb81ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c3b2c0
INFO: task kworker/0:925:6940 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   bab3b000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:926:6942 blocked for more than 478 seconds.
task:kworker/0:926   state:D stack:0     pid:6942  tgid:6942  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb85e08
 r9:83018005 r8:85af8000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000
 r5:85c7df8c r4:85c7dc00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c7df8c r4:85c4c600
 r10:61c88647 r9:85af8000 r8:85c4c62c r7:82804d40 r6:dddced80 r5:dddceda0
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r5:851af78c r4:851af400
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:84986380
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
 r9:83018005 r8:85af8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebca3000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c7e78c r4:85c7e400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c7e78c r4:85c4c700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85af8c00 r8:85c4c72c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c4c700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c4c700 r8:80287e08 r7:ecb85e60 r6:85acfb80 r5:85af8c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xecb89fb0 to 0xecb89ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c3b940
INFO: task kworker/0:927:6944 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   bb4bd000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:928:6946 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:928   state:D stack:0     pid:6946  tgid:6946  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed055d84 r8:00000002 r7:60000013 r6:ed055d8c r5:85afa400
 r4:85afa400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85afa400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed055e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c3bb80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85afa400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebd4f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:85c7eb8c r4:85c7e800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c7eb8c r4:85c4c780
 r10:61c88647 r9:85afa400 r8:85c4c7ac r7:82804d40 r6:dddced80 r5:dddceda0
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r5:851af78c r4:851af400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/0:929:6949 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:929   state:D stack:0     pid:6949  tgid:6949  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed061d84 r8:00000002 r7:60000113 r6:ed061d8c r5:85afbc00
 r4:85afbc00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85afbc00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed061e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c3bec0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85afbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec8b7000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c7f38c r4:85c7f000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c7f38c r4:85c4c880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85afbc00 r8:85c4c8ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c4c880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c4c880 r8:80287e08 r7:ecb85e60 r6:85acfc80 r5:85afbc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed061fb0 to 0xed061ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c3bd80
INFO: task kworker/0:929:6949 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   bbafb000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r5:00001000 r4:ea93d000
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:930   state:D stack:0     pid:6951  tgid:6951  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed105e08
 r4:00000000
 r5:85c7ef8c r4:85c7ec00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c7ef8c r4:85c4c800
 r10:61c88647 r9:85afc800 r8:85c4c82c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c4c800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c4c800 r8:80287e08 r7:ed061e60 r6:85acfd00 r5:85afc800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed105fb0 to 0xed105ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c3be80
INFO: task kworker/0:930:6951 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   bbafb000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:931:6952 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:931   state:D stack:0     pid:6952  tgid:6952  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r4:85af9800
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018005 r8:85af9800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000
 r5:85c7f78c r4:85c7f400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c7f78c r4:85c4c680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:85c4c680
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed185fb0 to 0xed185ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c3bcc0
INFO: task kworker/0:931:6952 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   bbafb000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
 r4:00000001
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r5:85afb000 r4:8291a680
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
 r5:00001000 r4:ecb91000
 r5:85c7fb8c r4:85c7f800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c7fb8c r4:85c4c900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:85c4c900
dfa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
9d20:                   bc09d000 edee7000 00000001 80239b98 7f0c9000 00000001
 r4:ea979dc0
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xea979fb0 to 0xea979ff8)
INFO: task kworker/0:933:6956 blocked for more than 478 seconds.
 r10:8291a684 r9:ed551d84 r8:00000002 r7:60000013 r6:ed551d8c r5:85afd400
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
 r5:00001000 r4:ecc1b000
 r5:85c7ff8c r4:85c7fc00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c7ff8c r4:85c4c980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85afd400 r8:85c4c9ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c4c980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c4c980 r8:80287e08 r7:ed18de60 r6:85acfe80 r5:85afd400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed551fb0 to 0xed551ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85b73f80
INFO: task kworker/0:933:6956 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   bc09d000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:934:6958 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:934   state:D stack:0     pid:6958  tgid:6958  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed559d84 r8:00000002 r7:60000113 r6:ed559d8c r5:85bb0000
 r4:85bb0000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85bb0000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed559e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c4a300
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85bb0000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:85c84b8c r4:85c84800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c84b8c r4:85c4ca00
 r10:61c88647 r9:85bb0000 r8:85c4ca2c r7:82804d40 r6:dddced80 r5:dddceda0
Exception stack(0xed559fb0 to 0xed559ff8)
 r4:85c3be80
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:935:6960 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:935   state:D stack:0     pid:6960  tgid:6960  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed5bdd84 r8:00000002 r7:60000013 r6:ed5bdd8c r5:85bb1800
 r4:85bb1800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85bb1800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5bde08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c4a000
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85bb1800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ecc77000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c8438c r4:85c84000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c8438c r4:85c4ca80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:85c4ca80
Exception stack(0xed5bdfb0 to 0xed5bdff8)
 r4:85c4a080
Workqueue: events bpf_prog_free_deferred
9d20:                   bc99e000 edee7000 00000001 80239b98 7f0c9000 00000001
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:936:6962 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:936   state:D stack:0     pid:6962  tgid:6962  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed5c5d84 r8:00000002 r7:60000013 r6:ed5c5d8c r5:85bb3000
 r4:85bb3000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85bb3000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5c5e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r9:83018005 r8:85bb3000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000
 r5:85c85b8c r4:85c85800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c85b8c r4:85c4cb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85bb3000 r8:85c4cb2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c4cb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c4cb00 r8:80287e08 r7:ed559e60 r6:85acf400 r5:85bb3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed5c5fb0 to 0xed5c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c4a040
INFO: task kworker/0:936:6962 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   bc99e000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
INFO: task kworker/0:937:6964 blocked for more than 478 seconds.
Call trace: 
 r5:85bb3c00 r4:8291a680
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c8478c r4:85c84400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c8478c r4:85c4cb80
 r10:61c88647 r9:85bb3c00 r8:85c4cbac r7:82804d40 r6:dddced80 r5:dddceda0
5fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
9d20:                   bd0a4000 edee7000 00000001 80239b98 7f0c9000 00000001
 r4:ea979dc0
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:938   state:D stack:0     pid:6966  tgid:6966  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85bb4800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed83de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c4a5c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85bb4800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed063000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c8538c r4:85c85000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c8538c r4:85c4cc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85bb4800 r8:85c4ccac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c4cc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c4cc80 r8:80287e08 r7:ed5c5e60 r6:85b62e00 r5:85bb4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed83dfb0 to 0xed83dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c4a440
INFO: task kworker/0:938:6966 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   bd0a4000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:00000001
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c84f8c r4:85c84c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:8478c800 r8:85c4cdac r7:82804d40 r6:dddced80 r5:dddceda0
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
INFO: task kworker/0:940:6971 blocked for more than 478 seconds.
 r10:8291a684 r9:ed841d84 r8:00000002 r7:60000013 r6:ed841d8c r5:8478e000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
 r5:00001000 r4:ed195000
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c8578c r4:85c85400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c8578c r4:85c4ce80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8478e000 r8:85c4ceac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c4ce80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c4ce80 r8:80287e08 r7:ed5c5e60 r6:85c4cf00 r5:8478e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed841fb0 to 0xed841ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c4a380
INFO: task kworker/0:940:6971 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   bd4b2000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:941:6973 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:941   state:D stack:0     pid:6973  tgid:6973  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed845d84 r8:00000002 r7:60000113 r6:ed845d8c r5:84870000
 r4:84870000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84870000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed845e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c4ac40
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84870000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:85c8638c r4:85c86000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c8638c r4:85c4c580
 r10:00000000 r9:85c4c580 r8:80287e08 r7:ed5c5e60 r6:85c4c300 r5:84870000
 r4:85c4aac0
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:82ac21e4
 r4:00000000
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:942:6974 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:942   state:D stack:0     pid:6974  tgid:6974  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed869d84 r8:00000002 r7:60000113 r6:ed869d8c r5:84870c00
 r4:84870c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84870c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed869e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c5e0c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84870c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eda8f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c8738c r4:85c87000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c8738c r4:85b83e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84870c00 r8:85b83eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85b83e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85b83e80 r8:80287e08 r7:ed845e60 r6:85b83f80 r5:84870c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed869fb0 to 0xed869ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c4a780
INFO: task kworker/0:942:6974 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   bde2b000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r5:00001000 r4:ea93d000
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018005 r8:84871800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000
 r5:85c85f8c r4:85c85c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:84871800 r8:85c4cc2c r7:82804d40 r6:dddced80 r5:dddceda0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   be391000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r5:84872400 r4:8291a680
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
 r5:00001000 r4:eda4f000
 r5:85c86b8c r4:85c86800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c86b8c r4:85c56000
 r10:61c88647 r9:84872400 r8:85c5602c r7:82804d40 r6:dddced80 r5:dddceda0
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:00000000
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r4:00000000
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
INFO: task kworker/0:945:6980 blocked for more than 478 seconds.
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c47280
 r5:85c8678c r4:85c86400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c8678c r4:85c56100
 r4:85c56100
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:84986380
task:kworker/0:946   state:D stack:0     pid:6982  tgid:6982  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda8de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c5e080
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84874800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:edacf000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c8778c r4:85c87400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c8778c r4:85c56280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84874800 r8:85c562ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c56280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c56280 r8:80287e08 r7:ed869e60 r6:85c56300 r5:84874800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeda8dfb0 to 0xeda8dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c4aac0
INFO: task kworker/0:946:6982 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   be6e2000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:947:6984 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:947   state:D stack:0     pid:6984  tgid:6984  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eda59d84 r8:00000002 r7:60000113 r6:eda59d8c r5:84875400
 r4:84875400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84875400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda59e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c5e240
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84875400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:edaaf000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c86f8c r4:85c86c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c86f8c r4:85c56400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84875400 r8:85c5642c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c56400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fa0:                                     00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c5e000
INFO: task kworker/0:947:6984 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   bec31000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
task:kworker/0:948   state:D stack:0     pid:6987  tgid:6987  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c5ec40
 r5:85c8d38c r4:85c8d000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c8d38c r4:85c56500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84876000 r8:85c5652c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c56500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c56500 r8:80287e08 r7:eda8de60 r6:85c56580 r5:84876000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeda99fb0 to 0xeda99ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c5e700
INFO: task kworker/0:948:6987 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   bec31000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:949   state:D stack:0     pid:6989  tgid:6989  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
 r5:85c87f8c r4:85c87c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c87f8c r4:85c56200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84876c00 r8:85c5622c r7:82804d40 r6:dddced80 r5:dddceda0
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:00000000
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
 r4:00000000
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
 r4:00000001
 r4:84986380
task:kworker/0:950   state:D stack:0     pid:6990  tgid:6990  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c5e780
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84873c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:edb0f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c8c38c r4:85c8c000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c8c38c r4:85c56680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84873c00 r8:85c566ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c56680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c56680 r8:80287e08 r7:eda99e60 r6:85c56700 r5:84873c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xedab9fb0 to 0xedab9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c5e500
INFO: task kworker/0:950:6990 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   bf668000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
Exception stack(0xea979fb0 to 0xea979ff8)
INFO: task kworker/0:951:6993 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:951   state:D stack:0     pid:6993  tgid:6993  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:edaf9d84 r8:00000002 r7:60000113 r6:edaf9d8c r5:85c20000
 r4:85c20000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85c20000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edaf9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c5e900
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85c20000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:edb2f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c8c78c r4:85c8c400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c8c78c r4:85c56800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85c20000 r8:85c5682c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c56800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c56800 r8:80287e08 r7:eda99e60 r6:85c56880 r5:85c20000
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Workqueue: events bpf_prog_free_deferred
Exception stack(0xea979d28 to 0xea979d70)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018005 r8:85c20c00 r7:00000000 r6:83018000 r5:00001000 r4:7f011000
 r5:85c8cf8c r4:85c8cc00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:85c20c00 r8:85c567ac r7:82804d40 r6:dddced80 r5:dddceda0
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r5:851af78c r4:851af400
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:953:6996 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:953   state:D stack:0     pid:6996  tgid:6996  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:edb19d84 r8:00000002 r7:60000113 r6:edb19d8c r5:85c21800
 r4:85c21800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85c21800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb19e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c61000
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85c21800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ecb6d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c8df8c r4:85c8dc00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c8df8c r4:85c56380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85c21800 r8:85c563ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c56380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c56380 r8:80287e08 r7:eda99e60 r6:85c56b80 r5:85c21800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xedb19fb0 to 0xedb19ff8)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r4:82ac21e4
 r4:ea979dc0
 r5:00001000 r4:ea93d000
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r5:85c22400 r4:8291a680
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecea9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c5ed80
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85c22400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebbb1000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c8cb8c r4:85c8c800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c8cb8c r4:85c56980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85c22400 r8:85c569ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c56980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c56980 r8:80287e08 r7:edb19e60 r6:85c56a80 r5:85c22400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xecea9fb0 to 0xecea9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c5ed00
INFO: task kworker/0:954:6998 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   bfb7b000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:851af78c r4:851af400
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:84986380
task:kworker/0:955   state:D stack:0     pid:7000  tgid:7000  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:00001000 r4:ec6fd000
 r5:85c8d78c r4:85c8d400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:85c56a00
5fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
 r4:00000000
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018005 r8:85bb6000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000
 r5:85c8db8c r4:85c8d800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c8db8c r4:85c56c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85bb6000 r8:85c56c2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c56c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c56c00 r8:80287e08 r7:edb19e60 r6:85b62f80 r5:85bb6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed2c1fb0 to 0xed2c1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c5ef00
INFO: task kworker/0:956:7001 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c03e5000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:957:7006 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:957   state:D stack:0     pid:7006  tgid:7006  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed2cdd84 r8:00000002 r7:60000113 r6:ed2cdd8c r5:85bb6c00
 r4:85bb6c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85bb6c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2cde08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c61200
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85bb6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eccd1000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c8e38c r4:85c8e000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c8e38c r4:85c56c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85bb6c00 r8:85c56cac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c56c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c56c80 r8:80287e08 r7:edb19e60 r6:85b88000 r5:85bb6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed2cdfb0 to 0xed2cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c61340
INFO: task kworker/0:957:7006 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r4:00000000
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c8eb8c r4:85c8e800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:85c56d00
Exception stack(0xed395fb0 to 0xed395ff8)
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:959:7008 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:959   state:D stack:0     pid:7008  tgid:7008  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed3d1d84 r8:00000002 r7:60000113 r6:ed3d1d8c r5:85afec00
 r4:85afec00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85afec00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3d1e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c61700
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85afec00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ecdcd000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c8e78c r4:85c8e400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c8e78c r4:85c56e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85afec00 r8:85c56eac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c56e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c56e80 r8:80287e08 r7:ed395e60 r6:85b88100 r5:85afec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed3d1fb0 to 0xed3d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c612c0
INFO: task kworker/0:959:7008 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
9d20:                   c0857000 edee7000 00000001 80239b98 7f0c9000 00000001
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r5:85afe000 r4:8291a680
 r4:00000000
 r4:00000000
 r5:85c8f38c r4:85c8f000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c8f38c r4:85c56e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85afe000 r8:85c56e2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c56e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c56e00 r8:80287e08 r7:ed3d1e60 r6:85b88180 r5:85afe000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed415fb0 to 0xed415ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c61400
INFO: task kworker/0:960:7010 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c0857000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84992780
Exception stack(0xea979fb0 to 0xea979ff8)
 r4:84986380
task:kworker/0:961   state:D stack:0     pid:7012  tgid:7012  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c8f78c r4:85c8f400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c8f78c r4:85c56f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85bb8000 r8:85c56fac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c56f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c56f80 r8:80287e08 r7:ed415e60 r6:85b88200 r5:85bb8000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed419fb0 to 0xed419ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c616c0
INFO: task kworker/0:961:7012 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c0ded000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c8ef8c r4:85c4cf80
 r4:85c4cf80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c4cf80 r8:80287e08 r7:ed419e60 r6:85b88280 r5:85bb8c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed2c5fb0 to 0xed2c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c61440
INFO: task kworker/0:962:7014 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c0eb2000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xea979fb0 to 0xea979ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
 r5:85bba400 r4:8291a680
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c61f00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c9438c r4:85c5d000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85bba400 r8:85c5d02c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c5d000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c5d000 r8:80287e08 r7:ed419e60 r6:85b88300 r5:85bba400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed421fb0 to 0xed421ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c61a80
INFO: task kworker/0:963:7018 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c0eb2000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
9fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:85bbb000 r8:85c5d0ac r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:82ac21e4
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:965:7022 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:965   state:D stack:0     pid:7022  tgid:7022  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed601d84 r8:00000002 r7:60000113 r6:ed601d8c r5:85bbd400
 r4:85bbd400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85bbd400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed601e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c61dc0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85bbd400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ecfb9000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c8fb8c r4:85c8f800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c8fb8c r4:85c5d280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85bbd400 r8:85c5d2ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c5d280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c5d280 r8:80287e08 r7:ed421e60 r6:85b88400 r5:85bbd400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed601fb0 to 0xed601ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
Exception stack(0xea979fb0 to 0xea979ff8)
INFO: task kworker/0:966:7024 blocked for more than 478 seconds.
 r4:85bbbc00
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed605e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c6d080
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85bbbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed29b000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c9578c r4:85c95400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c9578c r4:85c5d300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85bbbc00 r8:85c5d32c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c5d300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c5d300 r8:80287e08 r7:ed421e60 r6:85b88480 r5:85bbbc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed605fb0 to 0xed605ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c61e80
INFO: task kworker/0:966:7024 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c1953000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:967:7026 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:967   state:D stack:0     pid:7026  tgid:7026  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced80 r6:83018000 r5:85c9478c r4:85c5d100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85bbec00 r8:85c5d12c r7:82804d40 r6:dddced80 r5:dddceda0
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Workqueue: events bpf_prog_free_deferred
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
 r4:00000000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r5:85bbc800 r4:8291a680
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c5ef00
 r7:dddced80 r6:83018000 r5:85c94b8c r4:85c5d380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:85c5d380
Exception stack(0xed691fb0 to 0xed691ff8)
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r5:851af78c r4:851af400
 r4:00000001
Exception stack(0xea979fb0 to 0xea979ff8)
      Not tainted 6.15.0-rc6-syzkaller #0
 r10:8291a684 r9:ed5d1d84 r8:00000002 r7:60000113 r6:ed5d1d8c r5:85c26000
 r4:85c26000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85c26000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5d1e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b78100
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85c26000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed251000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c94f8c r4:85c94c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c94f8c r4:85c5d180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85c26000 r8:85c5d1ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c5d180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c5d180 r8:80287e08 r7:ed605e60 r6:85c5d400 r5:85c26000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed5d1fb0 to 0xed5d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85b78c00
INFO: task kworker/0:969:7029 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c21a9000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced80 r6:83018000 r5:85c95f8c r4:85c5d480
 r10:61c88647 r9:85c26c00 r8:85c5d4ac r7:82804d40 r6:dddced80 r5:dddceda0
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:971:7034 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:971   state:D stack:0     pid:7034  tgid:7034  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed699d84 r8:00000002 r7:60000013 r6:ed699d8c r5:85c25400
 r4:85c25400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85c25400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed699e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c6d2c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85c25400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed2cf000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c9538c r4:85c95000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c9538c r4:85c5d600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85c25400 r8:85c5d62c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c5d600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c5d600 r8:80287e08 r7:ed695e60 r6:85c5d680 r5:85c25400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed699fb0 to 0xed699ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c6d400
INFO: task kworker/0:971:7034 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c25ea000 edee7000 00000001 80239b98 7f0c9000 00000001
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r5:851af78c r4:851af400
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:84986380
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018005 r8:85c23c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000
 r7:dddced80 r6:83018000 r5:85c9678c r4:85c5d580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:85c5d580 r8:80287e08 r7:ed695e60 r6:85c5d700 r5:85c23c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeceb1fb0 to 0xeceb1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c6d380
INFO: task kworker/0:972:7036 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c2ab4000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
      Not tainted 6.15.0-rc6-syzkaller #0
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r9:83018005 r8:85c23000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000
 r7:dddced80 r6:83018000 r5:85c95b8c r4:85c5d780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85c23000 r8:85c5d7ac r7:82804d40 r6:dddced80 r5:dddceda0
Exception stack(0xed701fb0 to 0xed701ff8)
 r4:85c6d380
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
9d20:                   c2ab4000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace: 
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r9:83018005 r8:85c24800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000
 r7:dddced80 r6:83018000 r5:85c96b8c r4:85c5d900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85c24800 r8:85c5d92c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c5d900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c5d900 r8:80287e08 r7:eceb1e60 r6:85c5d980 r5:85c24800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed705fb0 to 0xed705ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c6d900
INFO: task kworker/0:974:7039 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c2d22000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
 r4:82ac21e4
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:8291a684 r9:ed6fdd84 r8:00000002 r7:60000113 r6:ed6fdd8c r5:85450000
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85450000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed5b5000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c9778c r4:85c97400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c9778c r4:85c5da00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85450000 r8:85c5da2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c5da00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c5da00 r8:80287e08 r7:ed705e60 r6:85c5da80 r5:85450000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed6fdfb0 to 0xed6fdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c6d780
INFO: task kworker/0:975:7041 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:80070013 r4:80239bb0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
Exception stack(0xea979fb0 to 0xea979ff8)
INFO: task kworker/0:976:7043 blocked for more than 479 seconds.
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced80 r6:83018000 r5:85c9638c r4:85c5db80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:00000000
 r5:80070013 r4:80239bb0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
Exception stack(0xea979fb0 to 0xea979ff8)
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:977   state:D stack:0     pid:7046  tgid:7046  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed7a9d84 r8:00000002 r7:60000013 r6:ed7a9d8c r5:85451800
 r4:85451800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85451800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7a9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c6de00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85451800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed475000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c96f8c r4:85c96c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c96f8c r4:85c5dc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85451800 r8:85c5dcac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c5dc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c5dc80 r8:80287e08 r7:ed6fde60 r6:85c5dd00 r5:85451800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed7a9fb0 to 0xed7a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c6df00
INFO: task kworker/0:977:7046 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c35a0000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
Exception stack(0xea979fb0 to 0xea979ff8)
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r5:00001000 r4:ed4fb000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:85c5dd80
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:00000000
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:979:7050 blocked for more than 479 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:979   state:D stack:0     pid:7050  tgid:7050  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed7b5d84 r8:00000002 r7:60000113 r6:ed7b5d8c r5:85453000
 r4:85453000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85453000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7b5e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r9:83018005 r8:85453000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85453000 r8:85c5db2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c5db00
 r10:00000000 r9:85c5db00 r8:80287e08 r7:ed6fde60 r6:85c5de80 r5:85453000
 r4:85c6d940
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r5:80070013 r4:80239bb0
 r4:00000000
 r5:00001000 r4:ea93d000
 r4:84992780
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018005 r8:85453c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85453c00 r8:85c5df2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c5df00
 r10:00000000 r9:85c5df00 r8:80287e08 r7:ed7b5e60 r6:85c5df80 r5:85453c00
 r4:85c5f0c0
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed871e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c5f800
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85454800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed881000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c9cb8c r4:85c9c800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c9cb8c r4:85c5dc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85454800 r8:85c5dc2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c5dc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c5dc00 r8:80287e08 r7:ed7ade60 r6:85c56d80 r5:85454800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed871fb0 to 0xed871ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c5f040
INFO: task kworker/0:981:7054 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c4327000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
 r5:85455400 r4:8291a680
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85455400 r8:85c5d22c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r4:ea979dc0
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84992780
9fa0:                                     00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r5:85456000 r4:8291a680
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:00001000 r4:ed7d1000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85456000 r8:85c510ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c51080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c51080 r8:80287e08 r7:ed871e60 r6:85c51100 r5:85456000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed87dfb0 to 0xed87dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c5f780
INFO: task kworker/0:983:7058 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c48be000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:984:7060 blocked for more than 479 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:984   state:D stack:0     pid:7060  tgid:7060  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed8e9d84 r8:00000002 r7:60000013 r6:ed8e9d8c r5:85456c00
 r4:85456c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85456c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed8e9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c5fa00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85456c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed927000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c9d38c r4:85c9d000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85456c00 r8:85c511ac r7:82804d40 r6:dddced80 r5:dddceda0
 r10:00000000 r9:85c51180 r8:80287e08 r7:ed871e60 r6:85c51200 r5:85456c00
 r4:85c5f780
Workqueue: events bpf_prog_free_deferred
9d20:                   c48be000 edee7000 00000001 80239b98 7f0c9000 00000001
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r5:851af78c r4:851af400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed875e08
 r9:83018005 r8:85c30000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85c30000 r8:85c512ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c4dbe000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:986:7063 blocked for more than 479 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:986   state:D stack:0     pid:7063  tgid:7063  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed935d84 r8:00000002 r7:60000013 r6:ed935d8c r5:85c31800
 r4:85c31800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85c31800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed935e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c5fc00
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85c31800 r7:00000000 r6:83018000 r5:00001000 r4:7f093000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed93f000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c9cf8c r4:85c9cc00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c9cf8c r4:85c51000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85c31800 r8:85c5102c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c51000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c51000 r8:80287e08 r7:ed875e60 r6:85c51380 r5:85c31800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed935fb0 to 0xed935ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c5f740
INFO: task kworker/0:986:7063 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c4dbe000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:987:7066 blocked for more than 479 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:987   state:D stack:0     pid:7066  tgid:7066  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed989d84 r8:00000002 r7:60000113 r6:ed989d8c r5:85c32400
 r4:85c32400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85c32400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed989e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c5fec0
 r7:dddced80 r6:83018000 r5:85c9db8c r4:85c51480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85c32400 r8:85c514ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c51480
 r10:00000000 r9:85c51480 r8:80287e08 r7:ed875e60 r6:85c51500 r5:85c32400
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Exception stack(0xea979d28 to 0xea979d70)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
Exception stack(0xea979fb0 to 0xea979ff8)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85c33000 r8:85c515ac r7:82804d40 r6:dddced80 r5:dddceda0
 r10:00000000 r9:85c51580 r8:80287e08 r7:ed875e60 r6:85c51600 r5:85c33000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed949fb0 to 0xed949ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c5fe80
INFO: task kworker/0:988:7068 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c53f6000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:989:7070 blocked for more than 479 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:989   state:D stack:0     pid:7070  tgid:7070  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed909d84 r8:00000002 r7:60000113 r6:ed909d8c r5:85c33c00
 r5:85c33c00 r4:8291a680
 r4:00000000
 r4:00000000
 r5:00001000 r4:edb7f000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85c33c00 r8:85c516ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c51680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fa0:                                     00000000 00000000 00000000 00000000
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c34800
 r5:85c34800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb69e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c424c0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85c34800 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:edbbf000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c9eb8c r4:85c9e800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c9eb8c r4:85c51400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85c34800 r8:85c5142c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c51400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c51400 r8:80287e08 r7:ed875e60 r6:85c51800 r5:85c34800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xedb69fb0 to 0xedb69ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c42200
INFO: task kworker/0:990:7073 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c53f6000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
Exception stack(0xea979fb0 to 0xea979ff8)
 r4:84986380
Workqueue: events bpf_prog_free_deferred
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edba9e08
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:85c87b8c r4:85c87800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c87b8c r4:85c51780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85c35400 r8:85c517ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c51780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c51780 r8:80287e08 r7:edb69e60 r6:85c51900 r5:85c35400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xedba9fb0 to 0xedba9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c42300
INFO: task kworker/0:991:7074 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c5b77000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:962:7077 blocked for more than 479 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:962   state:D stack:0     pid:7077  tgid:7077  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85c36c00 r8:85b8862c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r10:00000000 r9:85b88600 r8:80287e08 r7:ed1d1e60 r6:85c51a00 r5:85c36c00
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c66740
INFO: task kworker/1:962:7077 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c5b77000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:8291a684 r9:edbfdd84 r8:00000002 r7:60000113 r6:edbfdd8c r5:85c30c00
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:00001000 r4:edbdf000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85c30c00 r8:85c51aac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c51a80
 r10:00000000 r9:85c51a80 r8:80287e08 r7:edba9e60 r6:85c51b00 r5:85c30c00
INFO: task kworker/0:992:7078 is blocked on a mutex likely owned by task kworker/1:469:4237.
9d20:                   c615d000 edee7000 00000001 80239b98 7f0c9000 00000001
 r4:00000000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
Exception stack(0xea979fb0 to 0xea979ff8)
 r4:84986380
task:kworker/0:993   state:D stack:0     pid:7080  tgid:7080  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
 r4:00000000
 r9:83018005 r8:85cf0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:edbff000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c9ef8c r4:85c9ec00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c9ef8c r4:85c51980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85cf0c00 r8:85c519ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c51980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c51980 r8:80287e08 r7:edba9e60 r6:85c51b80 r5:85cf0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xedc09fb0 to 0xedc09ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c423c0
INFO: task kworker/0:993:7080 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c615d000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xea979fb0 to 0xea979ff8)
 r4:84986380
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018005 r8:85cf1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85cf1800 r8:85c51c2c r7:82804d40 r6:dddced80 r5:dddceda0
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Workqueue: events bpf_prog_free_deferred
Exception stack(0xea979d28 to 0xea979d70)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:995:7084 blocked for more than 479 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:995   state:D stack:0     pid:7084  tgid:7084  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:edbc9d84 r8:00000002 r7:60000013 r6:edbc9d8c r5:85cf2400
 r4:85cf2400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85cf2400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edbc9e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85cf2400 r8:85c51dac r7:82804d40 r6:dddced80 r5:dddceda0
 r10:00000000 r9:85c51d80 r8:80287e08 r7:edba9e60 r6:85c51e00 r5:85cf2400
 r4:85c42d80
Workqueue: events bpf_prog_free_deferred
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r4:00000000
 r5:00001000 r4:ea93d000
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:8291a684 r9:edc4dd84 r8:00000002 r7:60000013 r6:edc4dd8c r5:85cf3000
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r7:dddced80 r6:83018000 r5:85c9ff8c r4:85c51d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:85c42040
Call trace: 
Exception stack(0xea979d28 to 0xea979d70)
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:997:7088 blocked for more than 479 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:997   state:D stack:0     pid:7088  tgid:7088  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:edc6dd84 r8:00000002 r7:60000013 r6:edc6dd8c r5:85cf3c00
 r4:85cf3c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85cf3c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc6de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c55380
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85cf3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:edce3000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cac78c r4:85cac400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85cac78c r4:85c56f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85cf3c00 r8:85c56f2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c56f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c56f00 r8:80287e08 r7:edba9e60 r6:85c51880 r5:85cf3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xedc6dfb0 to 0xedc6dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced80 r6:83018000 r5:85c9fb8c r4:85c40080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:00000001
 r4:85c61fc0
Workqueue: events bpf_prog_free_deferred
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:999:7092 blocked for more than 479 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:999   state:D stack:0     pid:7092  tgid:7092  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:edcadd84 r8:00000002 r7:60000113 r6:edcadd8c r5:85cf5400
 r4:85cf5400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85cf5400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edcade08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c55100
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85cf5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:edcc3000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cac38c r4:85cac000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85cac38c r4:85c40200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85cf5400 r8:85c4022c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c40200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c40200 r8:80287e08 r7:edc6de60 r6:85c40280 r5:85cf5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xedcadfb0 to 0xedcadff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c552c0
INFO: task kworker/0:999:7092 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c714d000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:00000000
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Exception stack(0xea979fb0 to 0xea979ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
 r4:85cf6000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edccde08
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced80 r6:83018000 r5:85cad38c r4:85c40300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:00000001
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c74a6000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:1001:7096 blocked for more than 479 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:1001  state:D stack:0     pid:7096  tgid:7096  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:edcedd84 r8:00000002 r7:60000113 r6:edcedd8c r5:85cf6c00
 r4:85cf6c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85cf6c00 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edcede08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r9:83018005 r8:85cf6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000
 r7:dddced80 r6:83018000 r5:85cacf8c r4:85c40180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85cf6c00 r8:85c401ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:00000001
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r4:82ac21e4
 r4:00000000
 r5:851af78c r4:851af400
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:84986380
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r5:00001000 r4:edd23000
 r7:dddced80 r6:83018000 r5:85cacb8c r4:85c40000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:85c40000 r8:80287e08 r7:edccde60 r6:85c40600 r5:85cf0000
 r4:85c55680
Call trace: 
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:1003:7099 blocked for more than 479 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:1003  state:D stack:0     pid:7099  tgid:7099  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:edd0dd84 r8:00000002 r7:60000113 r6:edd0dd8c r5:85c36000
 r4:85c36000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85c36000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd0de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c55bc0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85c36000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:edd83000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cadb8c r4:85cad800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85cadb8c r4:85c40480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85c36000 r8:85c404ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c40480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c40480 r8:80287e08 r7:edccde60 r6:85c40580 r5:85c36000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:00000000
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r4:ea979dc0
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:8291a684 r9:edd2dd84 r8:00000002 r7:60000013 r6:edd2dd8c r5:84b38000
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:85cad78c r4:85cad400
 r7:dddced80 r6:83018000 r5:85cad78c r4:85c40500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b38000 r8:85c4052c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c40500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c40500 r8:80287e08 r7:edd0de60 r6:85c40700 r5:84b38000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xedd2dfb0 to 0xedd2dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c55b40
INFO: task kworker/0:1004:7101 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c7d39000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:1005:7104 blocked for more than 479 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
 r10:8291a684 r9:edd4dd84 r8:00000002 r7:60000113 r6:edd4dd8c r5:84b38c00
 r4:00000000
 r9:83018005 r8:84b38c00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000
 r7:dddced80 r6:83018000 r5:85caf38c r4:85c40800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:85c40800
Exception stack(0xedd4dfb0 to 0xedd4dff8)
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:1006:7106 blocked for more than 479 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:1006  state:D stack:0     pid:7106  tgid:7106  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:edd8dd84 r8:00000002 r7:60000013 r6:edd8dd8c r5:84b39800
 r4:84b39800
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b39800 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd8de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c55dc0
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84b39800 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:edda3000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cae38c r4:85cae000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85cae38c r4:85c40780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b39800 r8:85c407ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c40780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c40780 r8:80287e08 r7:edd4de60 r6:85c40900 r5:84b39800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xedd8dfb0 to 0xedd8dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c55b40
INFO: task kworker/0:1006:7106 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r4:00000000
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:8291a684 r9:eddadd84 r8:00000002 r7:60000013 r6:eddadd8c r5:84b3a400
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:85cadf8c r4:85cadc00
 r7:dddced80 r6:83018000 r5:85cadf8c r4:85c40a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Workqueue: events bpf_prog_free_deferred
Exception stack(0xea979d28 to 0xea979d70)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
      Not tainted 6.15.0-rc6-syzkaller #0
 r4:84b3b000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eddcde08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c42d40
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84b3b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:edde3000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85caeb8c r4:85cae800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85caeb8c r4:85c40b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b3b000 r8:85c40b2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c40b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c40b00 r8:80287e08 r7:edd4de60 r6:85c40b80 r5:84b3b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeddcdfb0 to 0xeddcdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c55b80
INFO: task kworker/0:1008:7110 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c8748000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:84986380
Workqueue: events bpf_prog_free_deferred
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018005 r8:84b3bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000
 r7:dddced80 r6:83018000 r5:85caef8c r4:85c40c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r5:00001000 r4:ea93d000
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018005 r8:84b3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cae78c r4:85cae400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85cae78c r4:85c40980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b3c800 r8:85c409ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c40980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c40980 r8:80287e08 r7:edd4de60 r6:85c40d00 r5:84b3c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xede0dfb0 to 0xede0dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85cbd080
INFO: task kworker/0:1010:7113 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c8de7000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:1011:7115 blocked for more than 479 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:1011  state:D stack:0     pid:7115  tgid:7115  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:edd6dd84 r8:00000002 r7:60000113 r6:edd6dd8c r5:84b3d400
 r4:84b3d400
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b3d400 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd6de08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cbd500
 r4:00000000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced80 r6:83018000 r5:85caf78c r4:85c40d80
 r4:85c40d80
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
 r5:80070013 r4:80239bb0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
Exception stack(0xea979fb0 to 0xea979ff8)
      Not tainted 6.15.0-rc6-syzkaller #0
 r4:84b3e000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecca9e08
 r5:00001000 r4:eca67000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85d30b8c r4:85c40680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b3e000 r8:85c406ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85c40680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85c40680 r8:80287e08 r7:edd4de60 r6:85c40f00 r5:84b3e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xecca9fb0 to 0xecca9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85cbd780
INFO: task kworker/0:1012:7118 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c9121000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85cafb8c r4:85c51f80
 r4:85c51f80
Exception stack(0xeccadfb0 to 0xeccadff8)
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:80070013 r4:80239bb0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/0:1014:7122 blocked for more than 479 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:1014  state:D stack:0     pid:7122  tgid:7122  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eccb1d84 r8:00000002 r7:60000113 r6:eccb1d8c r5:85d00000
 r4:85d00000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85d00000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccb1e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cbd980
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85d00000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec821000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85caff8c r4:85cafc00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85caff8c r4:85cca100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85d00000 r8:85cca12c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85cca100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85cca100 r8:80287e08 r7:ecca9e60 r6:85cca180 r5:85d00000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeccb1fb0 to 0xeccb1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85cbd940
INFO: task kworker/0:1014:7122 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c964c000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cbda40
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85d00c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec943000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85d3038c r4:85d30000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85d3038c r4:85cca200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85d00c00 r8:85cca22c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85cca200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85cca200 r8:80287e08 r7:ecca9e60 r6:85cca280 r5:85d00c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeccb5fb0 to 0xeccb5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85cbd640
INFO: task kworker/0:1015:7123 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c9ab0000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
 r4:00000000
 r5:851af78c r4:851af400
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:85d3138c r4:85d31000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85d3138c r4:85cca300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85d01800 r8:85cca32c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85cca300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85cca300 r8:80287e08 r7:ecca9e60 r6:85cca380 r5:85d01800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed059fb0 to 0xed059ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85cbdb40
INFO: task kworker/0:1016:7125 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   c9c4b000 edee7000 00000001 80239b98 7f0c9000 00000001
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r5:851af78c r4:851af400
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:8291a684 r9:ed16dd84 r8:00000002 r7:60000113 r6:ed16dd8c r5:85d02400
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:85d3078c r4:85d30400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
dfa0:                                     00000000 00000000 00000000 00000000
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:82ac21e4
 r4:00000000
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:1018:7129 blocked for more than 479 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:1018  state:D stack:0     pid:7129  tgid:7129  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed171d84 r8:00000002 r7:60000013 r6:ed171d8c r5:85d03000
 r4:85d03000
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85d03000 r4:8291a680
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed171e08
 r4:00000000
[<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cbdf40
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85d03000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ecc43000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85d30f8c r4:85d30c00
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85d30f8c r4:85cca400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85d03000 r8:85cca42c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85cca400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85cca400 r8:80287e08 r7:ed059e60 r6:85cca500 r5:85d03000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed171fb0 to 0xed171ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85cbdec0
INFO: task kworker/0:1018:7129 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   ca2af000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:1019:7131 blocked for more than 479 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:1019  state:D stack:0     pid:7131  tgid:7131  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ed175d84 r8:00000002 r7:60000113 r6:ed175d8c r5:85d03c00
 r4:85d03c00
[<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r4:00000000
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85d03c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed193000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85d3238c r4:85d32000
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85d3238c r4:85cca580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85d03c00 r8:85cca5ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85cca580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85cca580 r8:80287e08 r7:ed059e60 r6:85cca680 r5:85d03c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed175fb0 to 0xed175ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85c55e80
INFO: task kworker/0:1019:7131 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
 r4:84992780
Exception stack(0xea979fb0 to 0xea979ff8)
INFO: task kworker/0:1020:7134 blocked for more than 479 seconds.
 r4:85d05400
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5c9e08
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85d3178c r4:85d31400
 r7:dddced80 r6:83018000 r5:85d3178c r4:85cca600
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
9d20:                   ca706000 edee7000 00000001 80239b98 7f0c9000 00000001
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:84986380
Workqueue: events bpf_prog_free_deferred
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:85d31b8c r4:85d31800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85d31b8c r4:85cca700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85d04800 r8:85cca72c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85cca700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85cca700 r8:80287e08 r7:ed175e60 r6:85cca800 r5:85d04800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xed995fb0 to 0xed995ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85cbb080
INFO: task kworker/0:1021:7137 is blocked on a mutex likely owned by task kworker/1:469:4237.
task:kworker/1:469   state:R  running task     stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:00000000
[<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xea979d28 to 0xea979d70)
9d20:                   cab63000 edee7000 00000001 80239b98 7f0c9000 00000001
9d40: 82ac15a0 7f0c9000 edee7000 8280c928 82ac21c4 ea979da4 ea979da8 ea979d78
9d60: 80230ad0 80239bb0 80070013 ffffffff
 r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea979dc0 r5:ea979e08
 r4:ea979dc0
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r4:00000000
[<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:851af78c r4:851af400
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:851af78c r4:84992780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84992780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84992780 r8:80287e08 r7:dfaede60 r6:84991f00 r5:85168000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea979fb0 to 0xea979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:963:7139 blocked for more than 479 seconds.
 r5:85bbe000 r4:8291a680
[<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:8459cb8c r4:8459c800
[<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:82ac21c4 r9:85168000 r8:80200be4 r7:ea979d5c r6:ffffffff r5:85168000
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84986280
 r10:61c88647 r9:85168000 r8:849927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84986380
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:964:7140 blocked for more than 479 seconds.
      Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:964   state:D stack:0     pid:7140  tgid:7140  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred